Comment tldr (Score 5, Interesting) 163
can we all pitch in $5 a month and get this bennett guy his own blog? (and punt him the hell off slashdot?)
can we all pitch in $5 a month and get this bennett guy his own blog? (and punt him the hell off slashdot?)
>> What none of the attendees of the conference knew was that Google was pulling many of the strings behind the event
I doubt/hope that "no one knew." Conference agendas, like news stories, should always be read for brand-name frequency. (The brand name that appears most frequently or in the most positive manner is usually the one that hired the PR agency to plant the story in the first place. Same thing goes for a conference agenda.) What's the number one name on this conference agenda? Google.
So...if the academics attending the conference didn't guess it was Google sponsored...then they're probably not as bright as their titles suggest.
A "responsive image" will load either a small or large version (or multiple versions) depending on the browsers's screen resolution. To do this, it makes an extra request to the server before requesting the appropriate image size.
(The referenced Opera article prattles on and on - Google's faster.)
C'mon, with BUILD just behind us, how did this wall of text make it up here? (It's NOT a slow news day.)
Having lived through the entire lifecycle of "open source," it seems like its place in development communities and businesses is well-established, with a mix of different licensing and deployment models for whatever anyone wants to do.
So...is there really anything interesting left in "open source" to talk about? (Software patents, maybe, but even that's picked up some case law.)
>> Sane people will stay with salting and stretching, ideally with scrypt() to neutralize GPUs.
"Key stretching is orthogonal to PolyPassHash and could be trivially used in conjunction."
Hell, just the bit about bcrypt, etc. using a unique hash per password would have stopped most of these "grab the file then crack the table" hacks; the current focus of developers should probably just be to replace anything still using unsalted (or common salt) MD5/SHA1/SHA256 schemes.
>> some readers may note that with this story we are slowly rolling out one we hope you enjoy -- an audio version of each Slashdot story.
Er...no thanks. There's a reason video tanked on this site too - your readership is too damn busy to wait for the talky-talk. So, we skim (and type) like crazy, and value text-heavy sites like Slashdot and Reddit. (OK, 15 seconds - time up - back to work!)
Early use by a major company of Javascript consuming XML-based web services. Successfully leveraged Google's search engine. Design conflicted with the all-on-one-page "portal" paradigm of the time. Text ads instead of banner ads, and controversial because they were tied to the content of the messages. Original cluster was 300 servers.
...and both KDE users have already shown up to comment. Badabing!
Retailers a Top Target for Attackers in 2012, Trustwave Says
http://www.securityweek.com/re...
>> claims that much of the information on Wikipedia relating to (whatever) is "biased, misleading, out of date, or just plain wrong"
Er...no shit? Personally, I subscribe to this view: http://en.wikipedia.org/wiki/W...
>> planning to introduce a legislative package
Since when did Obama think a lawful path through Congress was a good option? Wasn't he the guy who said he'd work around our elected representatives to mandate the important things on his agenda?
Oh...I see. This is just a "planning to" press release. In other words, this is a BS trial balloon designed to get people off his back about the NSA without actually changing anything.
As a security guy who has also been on the short end of legal threats too I feel for this guy. He's burned out and could use a year on the beach. Take a year or two at a cushy corporate security job but please keep the list alive - there are plenty of other moderators who would pick up the slack.
The silliest thing about this press release is that it seems to ignore the fact that most car batteries (and certainly almost all large battery packs) are recycled and scrubbed so their components can be reused in new batteries.
I went to RSA on my company's dime for about five years, but was always asleep on a plane before Bill Clinton, Tony Blair or whoever else was there said their piece and collected their fee.
Now that I'm more selective about which conferences I attend (I've already "seen the show" at the big ones), hitting alternative conferences like DEFCON (instead of BlackHat), and Thotcon (Chicago) and now TrustyCon will continue to be my focus.
He has not acquired a fortune; the fortune has acquired him. -- Bion