Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Image

How Famous OS Logos Got Started 103

Shane O'Neill writes "Ronald McDonald and the NBC Peacock may get more TV air time, but today's operating systems have cool logos, too. Google, Apple, Microsoft and the Linux crowd crafted mascots ranging from cute lizards to circles of life. In this slideshow, we look at the origins of the logos and look ahead to their future."

Comment I got ripped off then (Score 1) 208

Your college credit is the salary.

If course credit and a piece of paper is their payment to me then I got ripped off. I hate the higher education system, but have learned to deal with its shortcomings and maneuver through the system to get my piece of paper so that I could finally have my work experience count towards a PE license. I was very annoyed while streaming my graduation ceremony* that the president of the university bestowed my degree upon me with recommendation from the faculty. BS I earned that degree, fulfilled all requirements for such and in then end it was because they felt I was worthy not because I actually did anything.
*I only watched graduation because the president was speaking and wanted to hear what he would say to students who are thousands of dollars in debt as a result of school and graduating in a time of almost no jobs. Worst commencement speech I've ever heard (not that I've been to many graduations).

--
So who is hotter? Ali of Ali's Sister?

Comment A Better Time (Score 1) 443

I long for the days of fully qualified URL's; 'http://www.domain.com'. I personally still type out the fully qualified domain names to half the websites I view each day (I typically only use bookmarks for address I use rarely). I also miss when the tld's meant something usefully and websites used a tld that matched their content

The internet does very little in addition to what I could already do in 1998 except now I have to deal with ads and pop-ups. I long for the days when individuals and companies setup webpages to showcase their interests or products not as revenue generators. I still run my webpages ad free and host my own servers because I want the information available.

--
So who is hotter? Ali or Ali's Sister?

Software

Submission + - Child Safe Desktop Environment

Gates82 writes: I have a 4 year old who has recently been drawn to playing on my ThinkPad Tablet. I would like to configure a desktop environment or find and application that creates a kid's safe platform. The most frustrating part for the two of us are miss-clicks; he'll minimize the game he is playing or bring up another window. This means being close (interpret interrupted frequently) while he is using the computer. To protect the computer and keep the child entertained what are some decent solutions? Should I configure a separate profile with reduced rights or is there an application that creates an isolated sydo-workspace?

Comment Re:um (Score 2, Informative) 200

Why the hell is a job search site collecting birth date, gender, and ethnicity information?

Most online applications have the optional equal opportunity information fields. Monster offers a way to auto submit this information. I'm not sure about the DOB, but this additional information is optional on Monster.

--
So who is hotter? Ali or Ali's Sister?

Comment I would say mitigated (Score 2, Interesting) 121

From what I heard they put up extra towers, and attempted to inform people of the potential problem. Encouraging users to not use the infrastructure is not surviving. If they had survived service would not have been interrupted based in normal use, not a reduction. Obviously I did not RTFA.

--
So who is hotter? Ali or Ali's Sister?

Security

Submission + - A Step Backwards in Online Banking Security

Gates82 writes: I have recently been frustrated by "added security" questions on banking and credit card websites. It seems that all of these institutions are heading towards a regular login and a second (3rd or 4th) security question to be used as a second authentication or as verification to reset your primary password. These questions seem a step backwards in security; now all that it is required to reset my password on these sites is to know my user ID and then answer a simple question (ie. place of birth, date of birth, pets names, etc) with most of the answers being quite publicly available. Personally, I normally bash on the keyboard and click continue not caring what the answer is; assuming that it will be more difficult to crack then guessing fluffy as a pet name. But to make matters more unbearable I attempted to login to a credit card website and was greeted with a second login and it was requesting an answer to one of these (hit-head-on-keyboard) questions. It took two calls to get logged in and I am now forced to use a password for each security question in place of the real answer.

This process seems like a way for companies to deal with joe blow who forgets his password every month when he goes to make a payment. But how insecure is this for the rest of us who are comfortable with our password making/remembering capabilities?
Intel

Dell's Intel Bias Caused By Under the Table Cash? 256

swschrad writes "There's a story up on Reuters today saying Dell faces a class-action lawsuit for finagling the books to hide under-table money from Intel. The hidden cash, up to a quarter-billion dollars a quarter, is alleged to have been paid to keep competing CPUs out of Dell PCs. Dell, their accountants at PriceWaterhouse, company founder Michael Dell, and former CEO Kevin Rollins are all avoiding comment on the pending litigation."

Slashdot Top Deals

"The four building blocks of the universe are fire, water, gravel and vinyl." -- Dave Barry

Working...