Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

+ - Debian 8 Jessie released->

linuxscreenshot writes: After almost 24 months of constant development the Debian project is proud to present its new stable version 8 (code name Jessie), which will be supported for the next 5 years thanks to the combined work of the Debian Security team and of the Debian Long Term Support team. Jessie ships with a new default init system, systemd. The systemd suite provides many exciting features such as faster boot times, cgroups for services, and the possibility of isolating part of the services. The sysvinit init system is still available in Jessie. Screenshots and a screencast is available.
Link to Original Source

Comment: Vaporware, meanwhile Path tracing is getting bette (Score 1) 134 134

Their demos are not very nice and mostly vaporware. For people interested in non-vaporware next generation rendering technology, I suggest you check out this video, based on Path Tracing which is a form of stocastich Ray Tracing. https://www.youtube.com/watch?... It looks to me like this technology is getting closer and closer to the mainstream, and the results are eons from any raster-based engine.

Comment: Re:Very suspicious (Score 1) 353 353

It is likely the case that the VPN providers were involved with some form of SPAM.

Cutting off Visa/Mastercard processing to the spammers clients such as online pharmacies has been a very successful approach:


No gain = no SPAM

Comment: Re:Stallman was right! (Score 1) 365 365

Because at the time, would Java had been under a different license, it had an incredible potential and surely would have enjoyed much wider adoption.

We had to stop using Java due to its non-free license.

And what is more important, the language is fragmented. Its non-freeness motivated the development of several runtimes/stacks, which, TTOMExperience, suffer from compatibility issues.

Comment: Re:Will the police get any evidence? (Score 1) 361 361

Well it seems some people is not familiar with TrueCrypt. You have an encrypted partition that you can show, and inside it (mixed in the free space) you have a second one. This way if the police forces you to decrypt you partition you can show the fake one, and they have no way of guessing whether you had another one, the most they can do is to destroy it.

Comment: Will the police get any evidence? (Score 1) 361 361

has had his house searched and a significant amount of material taken away by police for forensic examination

Frankly, I can't imagine that even the less prepared script kiddie wouldn't keep all their hacking data inside a TrueCrypt partition allowing him to claim plausible deniability.

That, an open wifi, then claim "it came that way, or I couldn't make my netbook connect, so I had to open it".

Given those basic security measures, what evidence could the police use to incriminate him? Video/screen surveillance? I can't think of any other way.

Comment: Re:About $2K savings per month (Score 1) 562 562

Aside from what other readers have noted (that getting a 5% return is very optimitics right now), you are not counting long term savings.

That is to say, today we have 1st generation power units which cost 3,500,000$ and save 100,000$ a year. Investing that money in the bank will return you 175,000$, all right, 75,000$ more than buying the machines.

But if you buy the power units, you are investing in power unit technology. So if they get a lot of customers, assume in 5 years time the units will cost 1.000.000$ and save you 300.000$ a year, a 30% ROI, no bank can compete with this. This is what happened with computer hardware, just look 20 years ago!

Comment: Quite a difference from theory to practice! (Score 1) 108 108

I guess previous work had the idea right, but actually building a system which can handle millions of links and reply in no time is not a small feature.

This reminds me of the discussion we had previously about the gap from research prototype transistors to having factories actually deliver them.

At the source of every error which is blamed on the computer you will find at least two human errors, including the error of blaming it on the computer.