Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Businesses

Submission + - How the Apple Tablet Could Save Computing (chicagoboyz.net)

Shannon Love writes: "Creating software requires more than just technology. Actually getting real software into the hands of individual end users requires a business model that connects users to programmers and keeps the programmers paid. In this month's Popular Science, Tom Conlon frets that the rumored Apple Tablet computer could spread the iPhone software distribution business model to the rest of the computing word. He believes that this will destroy the freedom and power of end users.

I argue that the Apple App store model will do the opposite. It will give end users more options and better software while at the same time making it possible for diverse small developers to make a living actually writing software. The article is aimed at a non-technical audience. (1800 words)"

Comment Effectively Zero Risk (Score 5, Insightful) 222

Based on that data, a 50% increase would raise one's theoretical high-end risk of developing a tumor in the head from 0.003% per year to 0.0045% per year.

This translates into an effectively zero risk. The risk is so low that an individual couldn't really justify spending any time or money trying to lower it further.

We've got to learn that even though our advancing technology allows us to measure smaller and smaller risk, that doesn't mean that "something has to be done!" for every risk we can measure.

Government

Army Buys Macs to Beef Up Security 342

agent_blue writes "The Army is integrating Macs into their IT network to thwart hack attempts. The Mac platform, they argue, is more secure because there are fewer attacks against OS X than Windows-based systems. 'Military procurement has long been driven by cost and availability of additional software--two measures where Macintosh computers have typically come up short against Windows-based PCs. Then there have been subtle but important barriers: For instance, Macintosh computers have long been incompatible with a security keycard-reading system known as Common Access Cards system, or CAC, which is heavily used by the military. The Army's Apple program, created [in 2005], is working to change that.'"

Slashdot Top Deals

egrep -n '^[a-z].*\(' $ | sort -t':' +2.0

Working...