Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment IMO: Deliberate, no accident. (Score 1) 550

"The best analogy in the Windows world for systemd is the Win95 registry..."

The Windows registry was designed to make it very, very difficult for people to make copies of software to use on another computer. The Windows registry was intentional obfuscation, and very much against the needs of users, because of the huge amounts of time it takes to understand and fix problems with the registry.

A comment below says, "SystemD is RedHat's version of embrace and extend." That seems a better explanation. The way it is being done is certainly deliberate. Starting a big hassle that damages the reputation of Linux is certainly against the needs of the users.

It seems that the entire U.S. culture is becoming more adversarial. For example, there are health care insurance policies that are written in such a way that the insured will not understand that they aren't being fully covered.

Companies are deliberately over-billing. Many people cannot afford the time to find all the ways they are being treated badly.

Submission + - Apple cannot fire Woz because he is still reporting to Steve Jobs (bizjournals.com)

McGruber writes: Last week, Steve Wozniak (http://www.woz.org/) spoke at an "Internet Summit" in downtown Raleigh, North Carolina.

During his remarks, Woz said that reports of him him "hating Apple" have been taken out of context: "I am an employee of Apple still. I want to be the only person who has been on the paycheck every single day since day one of the company. I don't think they can fire me."

Woz also explained that company paperwork says that he is stil reporting to Steve Jobs. "I said, 'oh, well, at least I can't get fired,'" he said. That's good because, earlier in the month, Woz responded to a hardware bug report (http://www.willegal.net/blog/?p=6023) regarding the original Apple-I.

There was no word on if Apple has tried to confisciate his red stapler.

Submission + - How to anesthetize an octopus (sciencemag.org)

sciencehabit writes: Researchers have figured out how to anesthetize octopuses so the animals do not feel pain while being transported and handled during scientific experiments. In a study published online this month in the Journal of Aquatic Animal Health, researchers report immersing 10 specimens of the common octopus in seawater with isoflurane, an anesthetic used in humans. They gradually increased the concentration of the substance from 0.5% to 2%. The investigators found that the animals lost the ability to respond to touch and their color paled, which means that their normal motor coordination of color regulation by the brain was lost, concluding that the animals were indeed anesthetized. The octopuses then recovered from the anesthesia within 40 to 60 minutes of being immersed in fresh seawater without the anesthetic, as they were able to respond to touch again and their color was back to normal. (Video)

Submission + - Ask Slashdot: TLD Acknowledgement Issues? 3

dr_pardee writes: I recently founded a small corporation and used Holdings in my business name. Since the .holdings top level domain exists, I decided to register a domain name with the .holdings extension.

What I have found is that larger companies and service providers are not acknowledging .holdings as a valid TLD and it's been a complete hassle.
AWS ("SNS does not currently support the newer TLDs like .holdings."), Microsoft Volume Licensing (Uses InterNIC to valid domain names), Elance (".holdings for email addresses is not accepted"), HP, etc... will not accept it.

Is it reasonable to expect that companies acknowledge gTLDs allowed by ICANN? Have others been facing this?

Comment Mod parent up. It's deliberate dishonesty. (Score 1) 223

In 2008, banks arranged bank failures that caused job loss. That allowed companies to fire 10% of their staff and make the other 90% do the work because the 90% were afraid they would lose their jobs, also.

People are so overworked that they don't feel they have time to investigate over-billing. Companies take advantage of that by being as difficult as possible. It's deliberate dishonesty and becoming a standard way U.S. companies do business.

(I imagine that English is a 2nd language for the parent commenter.)

Submission + - US Marshals flying cell tower spoofers on small planes. (telegraph.co.uk)

whoever57 writes: The US Marshals Service is running cell tower spoofers on small planes. These devices are called "dirtboxes". The devices are made by Boeing Co. and can collect information from tens of thousands of cellphones in a single flight. When asked about the program, the US Justice department could neither confirm nor deny the reports.

Submission + - Can the US reverse its internet provider corporatocracy? (sonic.net)

riskkeyesq writes: Dane Jasper, CEO of Sonic.net wrote: "There are a number of threats to the Internet as a system for innovation, commerce and education today. They include net neutrality, the price of Internet access in America, performance, rural availability and privacy.

But none of these are the root issue, they’re just symptoms.

The root cause of all of these symptoms is a disease: a lack of competition for consumer Internet access."

Soft landings for former legislators, lobbyists disguised as regulators, hundreds of thousands of miles of fiber sitting unused, the sham that is the internet provider free market is keeping the US in a telecommunications third-world.

What, exactly, can American citizens do about it?

Submission + - Senate may vote on NSA reform as soon as next week (dailydot.com) 1

apexcp writes: Senate Majority Leader (for now) Harry Reid announced he will be taking the USA FREEDOM Act to a floor vote in the Senate as early as next week. While the bill, if passed, would be the first significant legislative reform of the NSA since 9/11, many of the act's initial supporters have since disavowed it, claiming that changes to its language mean it won't do enough to curb the abuses of the American survailence state

Submission + - Five years of the Go programming language! (golang.org)

omar.sahal writes: Go celebrates five years of it's existence with this blog post recapping a little history, future and some philosophy.

Five years ago we launched the Go project. It seems like only yesterday that we were preparing the initial public release: our website was a lovely shade of yellow, we were calling Go a "systems language", and you had to terminate statements with a semicolon and write Makefiles to build your code. We had no idea how Go would be received. Would people share our vision and goals? Would people find Go useful?

The Go programming language has grown to find it own niche in the cloud computing word, having been used to code Docker and the Kubernetes projects. The developers also announce details of further projects to be released, such as a new low-latency garbage collector and support for running Go on mobile devices.

Comment Mozilla needs better management. (Score 1) 181

Pale Moon x64 is Firefox with adult supervision.

Firefox is becoming less and less stable. It's so unstable that it often doesn't report crashes, so the crash reports aren't reliable, they show far fewer crashes than actually occurred.

The underlying problem is that Mozilla Foundation needs better management. At present, Mozilla Foundation management is sometimes excellent and sometimes very unreliable.

Comment XP vulnerabilities are exaggerated. (Score 1, Interesting) 37

In many cases, XP vulnerabilities are minimal. Don't use Internet Explorer. Every user should have limited rights. Users should be trained not to open files that haven't been arranged in advance. Use a software firewall that monitors outgoing traffic.

Most writers for technical publications have limited technical knowledge. What is not said in the article linked by Slashdot is that computers that run software firewalls that monitor outgoing traffic are far more protected.

Quoting from the article: "For this attack scenario to be successful, the user must be convinced to open the specially crafted file containing the malicious OLE object. All Microsoft Office file types as well as many other third-party file types could contain a malicious OLE object."

Another quote: "A successful exploitation could lead to the attacker gaining same user rights as the current user, and if that means administrative user rights, the attacker can install programs; access, modify, or delete data; or create new accounts with full user rights."

This article explains some of the issues: Microsoft Windows XP "end of life": Conflict of interest.

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...