Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Do Australians care? (Score 1) 154

In fairness, the "admitted liar" bit is a positive to most people I've spoken to. Realistically, most people are of the belief that most politicians are lying on a regular basis to start with; Abbott's stating of that fact was a refreshing dose of reality.

Of course, his political opponents have tried to label him as "Phony Tony" because of it, but from what I can see it simply hasn't worked. Particularly given that it's coming from political opponents who in the eyes of the public have reneged on implementing the lion's share of their own policy platform since gaining power. Calling your opponent a liar when the public sees you as liar isn't exactly a sound strategy for winning political points.

Windows

Submission + - Windows 7 Metric Provider a Fake (computerworld.com)

An anonymous reader writes: The tech world was up in arms after Craig Barth, CTO of Devil Mountain, claimed that the vast majority of Windows 7 PC's were maxing out their physical memory (article and Slashdot post), resulting in performance degradation at a rate much higher than XP and Vista machines. Critics basically called the data bunk, citing memory usage models, Vista/7 tech like SuperFetch, disk caching techniques, anecdotal evidence, etc. Barth fired back, defending the validity of his company's metrics. Heck, they even dragged in one of the editors of Ars Technica into the mix, exposing the metrics gathered from his PC linked with his name. Well, the cat is out of the bag, folks: Barth doesn't exist. Gregg Keizer, the ComputerWorld contributor who first posted the story, just found out his source was a fake. From the article:

"Craig Barth," the chief technology officer of Florida-based Devil Mountain Software, a company that makes and markets Windows performance metrics software, is, I have discovered, nobody. He doesn't exist. Barth is, in fact, a nom de plume, which is a fancy, French way of saying "alias." The real man behind the curtain is Randall C. Kennedy, a popular, sometimes outrageous blogger for and frequent contributor to Infoworld, a publication that like Computerworld is part of IDG.

Fortunately...

Kennedy's connection to InfoWorld was severed on Friday.

Who says geeks don't love a good soap opera?

Submission + - Amount of porn I posess poll

caffiend666 writes: 1) You can prove nothing
2) Only on work computer
3) Less than a meg
4) About 10 meg
5) About a gig
6) Less than 100 gig
7) Less than 1 terabyte
8) Greater than 1 terabyte
9) Googled Porn takes up no space

Submission + - 'Killing in the Name' UK No. 1 thanks to Facebook (bbc.co.uk) 2

Josh04 writes: Due to a 900,000+ Facebook campaign, 90's rap metal group Rage Against the Machine are this year's Christmas number 1, beating out Simon Cowell's X-Factor contestant Joe McElderry to the top spot, making 'Killing in the Name' the first ever UK download-only Christmas number 1. The popular 90's rock song had support from celebrities and the BBC, who got in trouble earlier in the week for allowing five 'fucks' to slip through the censor on a live performance.

Submission + - Not Just Drones; Military Aircraft Susceptible Too (wired.com) 2

azoblue writes: Tapping into drones’ video feeds was just the start. The U.S. military’s primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to electronic interception, multiple military sources tell Danger Room. That means militants have the ability to see through the eyes of all kinds of combat aircraft — from traditional fighters and bombers to unmanned spy planes. The problem is in the process of being addressed. But for now, an enormous security breach is even larger than previously thought.

Submission + - Utah Senate Considering Anti-Cybersquatting Bill (tp1.ca)

soren42 writes: "Utah State Senator Stephen Urquhart, Chairman of the Transportation and Public Utilities and Technology Committee, has proposed the "Utah E-Commerce Integrity Act", a law that creates a stronger deterrent against the practice of cybersquatting. The law also expands the liability for cybersquatting activity to include the registrant's authorized licensee, agent, affiliate, representative, domain name registrar, domain name registry, or other domain name registration authority that knowingly and actively assists a violation of this Act by the registrant. This could potentially set a precedent for similar changes at the federal level."
Earth

US Patent Office Fast Tracks Green Patents 136

eldavojohn writes "A new initiative is being piloted where 'green' patents are given special priority over other patents in the backlogged system. David Kappos (Under Secretary of Commerce for Intellectual Property and Director of the USPTO) said, 'Every day an important green tech innovation is hindered from coming to market is another day we harm our planet and another day lost in creating green businesses and green jobs. Applications in this pilot program will see a significant savings in pendency, which will help bring green innovations to market more quickly.' The details of how you qualify for a green patent (PDF) are available with patent blogs offering opinions on this initiative."
Patents

Submission + - Red Hat Files Amicus Brief in Bilski Patent Case (groklaw.net)

I Don't Believe in Imaginary Property writes: "Red Hat has filed a friend of the court brief with the Supreme Court in regards to the In Re Bilski case, which has become incredibly important due to the possibility that it could redefine the scope of patentable subject matter in a way that affects software patents. In the brief, Red Hat argues that software should not be considered patentable subject matter because it causes economic harm due to patents being granted with vague subject matter, which makes it impossible to say that a given piece of software doesn't arguably infringe upon someone's patent. They also point out Knuth's famous quote that you can't differentiate between 'numeric' and 'non-numeric' algorithms, because numbers are no different from other kinds of precise information. It's a pity, though, that they don't seem to directly address Professor Lee Hollaar's brief that gave a hand-waving excuse about the Curry-Howard correspondence being merely 'cosmetic' (whatever that means), even though you can turn ZFC into a program (ZFC being the axiomatic framework in which almost all math is done) and you can turn programs into math in order to verify them. Of course, this is the guy who called the successor function 'essentially nonsense', presumably because he doesn't think that mathematicians can differentiate between assignment and equality the way computer scientists can."
Security

Microsoft Blocks Pirates From Security Essentials Software 291

CWmike writes "Microsoft will block users running counterfeit copies of Windows from installing the free Security Essentials antivirus software, said Alex Kochis, director of Microsoft's Genuine Windows team, in a post to a company blog. On-again, off-again debates about the wisdom of blocking security-oriented downloads like patches or defensive software have centered around the argument that Microsoft should protect all users, including pirates, since hijacked PCs threaten the entire Windows ecosystem. In this case, though, one analyst isn't buying that line. 'I can't see any justification for making Microsoft give away Security Essentials [to counterfeit Windows users],' said John Pescatore, Gartner's primary security analyst. 'Those people have many other choices, including free. There are plenty of alternatives to Security Essentials,' he said, adding that that makes a difference. Windows patches, on the other hand, aren't available from anyone but Microsoft."

Submission + - A Look Inside Microsoft's New Container Farm (datacenterknowledge.com) 1

1sockchuck writes: "Microsoft today opened the doors on its $500 million container data center near Chicago, an immense 700,000 square foot structure that is a key ingredient in the company's ambitions for its Live suite of cloud computing services. The new data center allows Microsoft to deploy 40-foot long double-decker containers, with the bottom level packed with up to 2,000 servers while the top container holds power and cooling infrastructure. Microsoft announced the facility back in 2007, but in the meantime Google has disclosed that it built its own container-filled data center in late 2005. Google also holds a patent for a data center container design."

Slashdot Top Deals

"Summit meetings tend to be like panda matings. The expectations are always high, and the results usually disappointing." -- Robert Orben

Working...