Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:And that is a good thing... (Score 1) 102

I'm sure that serving you a lot of ads is the point of the excessive length of internet recipes, but there's another reason, too. A simple list of ingredients, or a list of instructions (like how to build Ikea furniture) cannot be copyrighted. I think many of these overly verbose recipe authors really do want to make it appear that their own takes on the recipes are distinct and innovative, and that helps them secure their own content from being scraped wholesale. But of course, AI just says, "fuck it, I can summarize," and it's pretty hard to prove it was your recipe it summarized..

Comment Re:Ah yes (Score 1) 201

Sarifs are, in fact, for ease of reading, but point well taken. The justifications are wrong and the people making them are petty assholes.

It's true, seifs are for ease of reading ... but so is Calibri. However, I believe Calibri was created for ease of reading on screens, while this article talks about documents on letterhead. So it's possible the choice of Calibri was misguided to begin with. Furthermore, according to the article, the number of “accessibility-based document remediation cases” – which I take to mean instances where somebody requests a document be reformatted for accessibility reasons – has not declined. So he's saying that, while this is a purely subjective aesthetic choice, the original change to Calibri never helped anything anyway.

Submission + - Network security devices endanger orgs with '90s era flaws (csoonline.com)

snydeq writes: Built to defend enterprise networks, network edge security devices are becoming liabilities, with an alarming rise in zero-day exploits of what experts describe as basic vulnerabilities, writes CSO's Lucian Constantin in a report on the state of the security product industry. 'Attackers constantly evolve their techniques. Security engineering, inherently challenging, can’t fix everything. All software products have vulnerabilities, even security tools. These would be valid responses if we were dealing with complex flaws, says Benjamin Harris, CEO of cybersecurity and penetration testing firm watchTowr. “But these are vulnerability classes from the 1990s, and security controls to prevent or identify them have existed for a long time. There is really no excuse.”' Constantin talks with security experts on the rising use of network security device vulnerabilities for initial access —and with the vendors on what steps they are taking to stem the tide.

Slashdot Top Deals

All the simple programs have been written.

Working...