Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Sad, sad, sad. (Score 1) 514

You're thinking of Agilent.

HP spun off all the cool engineering stuff into a separate company because it was like "too hard to compete with IBM and Dell when the CEO has to spend precious time on 'worthless stuff'" like cesium clocks, heart defibrillators (though maybe sold off by now), inkjet-printed DNA Micro-array scanning chips*, satellite testing equipment, optical "bubble" network switches, and way, way, more, all of which went to make Agilent in 1999. I've always been a little disappointed that the calculator division stayed with HP.

HP may have kept the name, but little else of value.

* The DNA micro-arrays probably didn't exist then, but they are at Agilent now.

Image

Man Sues Neighbor For Not Turning Off His Wi-Fi Screenshot-sm 428

Scyth3 writes "A man is suing his neighbor for not turning off his cell phone or wireless router. He claims it affects his 'electromagnetic allergies,' and has resorted to being homeless. So, why doesn't he check into a hotel? Because hotels typically have wireless internet for free. I wonder if a tinfoil hat would help his cause?"

Comment Re:What do people use Perl for? (Score 2, Insightful) 235

I use Perl for one-time jobs... Repairing badly-formatted 80GB data files. Splitting flat files into multiple output files. Testing uniqueness of various fields. Finding the line(s) in a 250GB file that is crashing the sqlload program, and fixing it, because you have two hours or we'll lose the project. (nevermind it's the client's data). Editing several files to purge or excise fields or characters before doing serious work with them. Most of these I do via the command line. I'll write actual Perl scripts to crawl throughout our network and gather statistics on files and projects, to test patch status, to download files, process them, and email the results.

Quick! The boss is standing over you demanding that you convert a flat file into csv, add a header, prepend a unique id, and spit any lines with weird characters into a separate file. Here's the printout of the layout. You have ten minutes. There's a million lines in the file and they've got to build a marketing model before the client meeting in one hour.

Comment Re:I'm on the Mall right now (Score 0) 212

Bush was on vacation clearing brush 1/2 of his presidency until 9/11, and as we found out later, he'd been gunning for invading Iraq since he became President. Plus, Bush flatly ignored the report that Bin Laden was going to attack the US.

There's no fucking way that Al Gore would have sent our military to invade Iraq, pushed for torture, greatly expanded the secret prisons. That war drained our military, drained our economy, and filled our hospitals with vetrans who will be on healthcare for the rest of their lives.

Al Gore's big thing was fighting climate change, which would have resulted in a new technology and research boom in America, NO NEW WARS, and he would not have pissed away the goodwill of the foreign nations, if he'd been unable to prevent 9/11. Plus, fighting climate change has the side-effect of reducing our foreign energy dependence. I have no doubt that Al Gore would have had a better pick for FEMA head, and a better response for Katrina. He wouldn't have been the second coming of Christ, but at least he wouldn't have been indifferent and snarky and intentionally destroying government effectiveness.

Bush and his team were fucking awful for the US.

Obama's pretty fucking decent. He can actually write his own speeches, and he reads the newspapers, and he can effectively lead and organize. That'll be a shit-load better than Bush. If people are treating Obama like the second-coming, it's only because we've survived eight-years of Bush.

Image

The Zen of SOA Screenshot-sm 219

Alex Roussekov writes "The book "Zen of SOA" by Tom Termini introduces an original view to the challenging world of SOA. He refers to the Zen philosophy as a "therapeutic device" helping SOA practitioners to get rid of prejudices and opinions in order to apply a clear mind-set based on real-life experiences and the application of technology knowledge. Each chapter of the book is prefaced by Zen Truism that the author suggests to "revisit, reflect on it longer, and see if you are able to establish a truth from the narrative, as well as from your own experiences." In fact, the book is about a SOA Blueprint outlining a methodology for building a successful SOA strategy. The target audience is C-level Executives, IT Managers and Enterprise Architects undertaking or intending to undertake adoption of SOA throughout their organizations. I strongly recommend the book to all SOA practitioners involved in implementation of SOA." Read below for the rest of Alexander's review.

Comment Re:I didn't even know... (Score 1) 507

ARGH! Deux ex machina! After reading the thoughtful foreword in Hunters of Dune (describing the lost manuscript found in the bank vault) I looked forward to a wonderful and considerate continuation of one of my favorite series...

At the end I felt like I'd watched Santa Claus get raped by R. Daneel Olivaw, and then Tinkerbell waved her fairy dust and suddenly everyone was all right and laughing together even while the smell of roasted reindeer giblets filled the air.

Businesses

Interest Growing For Pre-Paid Game Cards 70

Worlds in Motion is running an interview with GMG Entertainment, a company finding success marketing pre-paid "digital currency cards" used online for games and other entertainment services. Customers and retailers alike are enjoying the simplicity and utility of the cards, and GMG suggests that this segment of the industry will only continue to grow: "I estimate this year that you'll see EA enter this space for some of their games, and a few other big names are absolutely interested. In fact we're in final negotiations with a couple of recognizable names. We tend to estimate the size of the total pre-paid gaming card business when we do our numbers, and this year we're looking to something between $75-100 million dollars in sales across North America. We see that going to $250-300 million in 2009 and being in the region of a half-billion by 2010. We see this market growing dramatically in the next two to five years."
It's funny.  Laugh.

NBC to Create Programs Centered on Sponsors 286

explosivejared writes "It sounds farcical when you first hear it, but NBC has teamed up with an ad agency to produce actual feature programs that are centered around promoting the products of the network's sponsors. The network has already begun production on one sci-fi program entitled 'Gemini Division,' which will act as a platform for products from Microsoft, Intel, and Cisco. The programming will be broadcast via the network's 'digital properties,' e.g. the NBC web site. I guess it was only a matter of time for something like this to come along after product placement became the norm."
Security

Child-Suitable Alternatives To Passwords? 895

An anonymous reader writes "Two months ago I donated my old PC to my little sister, who is 7 — I had promised she would get her own computer as soon as she can read and write properly. I then proceeded to answer her questions about how it works, as far as she inquired, and tried to let her make some choices when installing Debian (she can already use GNOME). As I explained password protection and encryption to her, I was pleasantly surprised when she insisted on protection measures being as strong as possible, so that no one else can screw with her computer. She knows that my younger brother has to endure strict parental control software that was installed on his machine without his consent. The significant problem is that she cannot permanently memorize abstract passwords, even if they are her own creation. I talked with a teacher who assured me that this is common at her age. My parents would probably be able to guess non-abstract passwords. What mechanism of identifying herself does the Slashdot crowd suggest?"
Security

Antivirus Inventor Says Security Pros Are Wasting Time 282

talkinsecurity writes "Earlier this week Peter Tippett, chief scientist at the ICSA and the inventor of the progam that became Norton Antivirus, had some interesting things to say about the state of the security industry. In a nutshell, Tippett warned that about a third of the work that security departments do today is a waste of time. Tippett goes on to systematically blow holes in a lot of security's current best practices, including vulnerability research/patching, strong passwords, and the product evaluation process. 'If a hacker breaks into the password files of a corporation with 10,000 machines, he only needs to guess one password to penetrate the network, Tippett notes. "In that case, the long passwords might mean that he can only crack 2,000 of the passwords instead of 5,000," he said. "But what did you really gain by implementing them? He only needed one."' Some of his arguments are definitely debatable, but there is a lot of truth to what he's saying as well."
GUI

Command Line Life Partner Wanted 503

emj writes "Craiglist offers an interesting approach to finding a life partner , summmary: "There is a sad truth to the world today. I am part of a dying breed of people known as "shell users." ... Because there are fewer and fewer of us, I must help keep our lineage alive. I am looking for someone to help me do this. I need a woman (obviously) who is willing to raise a child with me in the method of Unix."."
Math

44 Conjectures of Stephen Wolfram Disproved 158

Richard Pritches writes in to let us know that MIT errata expert Evangelos Georgiadis has disproved 44 conjectures set by Dr. Stephen Wolfram (founder of Mathematica) in A New Kind of Science. The paper was published in the latest issue of the Journal of Cellular Automata and can be read in PDF form at Prof Edwin Clark's collection of reviews of Wolfram's ANKS. "The formulas provided by Wolfram for these [44] rules are not minimal. Moreover for 8 of these cannot be minimal even by simple inspection since minimal formula sizes for 3-input Boolean functions over this basis never exceeds 5."

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...