Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment All cable providers should try this (Score 4, Insightful) 329

I know if my mother-in-law had just the Hallmark channel, the game show network and one other she'd switch providers, even it only saved her 30%.

Alternatively, if there was a way to just get Netflix to stream random stuff in preselected genres all day I could get her off cable altogether - tens of millions of people just want the TV on all the time because they live alone, but can't stand the crap the broadcast networks have during the day and have no need for ESPN.

Comment No mention of iPad in the summary? (Score 2) 160

As I remember it, the Nexus 7 was part of a strategic campaign by Google to ensure that "tablet" didn't mean "iPad" by introducing a high-quality Android device supported by Google itself to the masses. Now that that mission's largely been accomplished (e.g., if you're just looking for a tablet to browse the Internet and run a couple of simple apps, would you really shell out the extra money buy an iPod?) and there are many high-quality Android tablet alternatives in every form factor imaginable, the Nexus 7 isn't needed so much.

Comment This is already happening. (Score 1) 352

This is already happening. Just look around your local state for "tuition-free online public school" (often also a "charter" school) and you will find this model already in use.

At a national and state level, government wonks are also pushing this model. Look up "common core" and note how well the OP's concept of a (centralized national) "curriculum facilitator" fits vs. the old concept of a (decentralized and local) "content expert."

Comment TLDR (Score 4, Insightful) 17

That's the "short" version? Yeesh. Anyway, here's what that article was trying to say:

Two things are likely to pass:
1) Cybersecurity Information Sharing Act: Lets Homeland Security invent regulations to let companies and governments at all levels share data about people. Good for law enforcement, bad for privacy and civil rights, good for corporations who share too much trying to please the government (because of a liability shield).
2) Something else similar with some provisions keeping the NSA at arms length to molify the public, but I lost interest exactly what it was because the article was pretty confusing.

Comment Re:anonymous kidnapping? (Score 1) 86

>> How can a system at the same time aggregate and make data anonymous

Given existing PC-driven redaction of police reports, I'd expect it to read something like this:

(race redacted) (gender redacted) (age redacted) adult or child wearing (clothing redacted) and (method of transportation redacted), possibly named (name redacted) wanted as a person of interest in the alleged (incident redacted) that was reported on (date/time redacted) at (place redacted). If you have any information about this alleged incident or this person, please call (main, overloaded and disinterested dispatcher phone number with 30-minute hold time) and remember to obey all police commands at all time.

Comment Yahoo is still a "tech" company? (Score 1) 194

>> influx of skilled developers and engineers, Yahoo still struggles to define its place on the modern tech scene

If it helps put it in context, I recently left a Midwestern tech job and advertised a yahoo email address (rather than one that would have highlighted my moonlighting - ahem) for people who wanted to stay in touch. The number of people who showed up on Twitter to give me shit for still having a Yahoo address was telling.

Comment Re:Not sure this helps... (Score 1) 190

>> how does the external malware know what certificates your organization allow

The same way hackers with malicious HTTPS sites do today. They look at the ungodly-long list of default Microsoft CA certs, find a "broken" CA in that list that can be corrupted or whose issuer doesn't really care, and get a signed certificate that looks legit to 99.9% of all corporate users today.

(So far the signing system for Microsoft has also used the Microsoft Certificate Store; the certificates used to allow signed executables just have a different role.)

Comment Not sure this helps... (Score 3, Insightful) 190

Unless Microsoft's changed something, you can still change the code in (non-device driver) SIGNED executables. (Try it today by flipping a few junk bits in a signed app and see if Microsoft notices the difference.) If that remains true, this isn't much of a deterrent to malware at all.

Furthermore, some of the biggest recent hacks (e.g., Sony) used a SIGNED commercial device driver (running in trial mode) to circumvent NTFS permissions; a default scheme that allows only signed executables wouldn't stop that down either.

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...