Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Windows Phone looks decent enough but... (Score 1) 423

by DogDude (#49183729) Attached to: Microsoft Convinced That Windows 10 Will Be Its Smartphone Breakthrough
MS needs to come up with something that convinces people it's worth switching!

I dunno. I think their try it out campaign was pretty good. Anybody who uses the windows Phone for about a minute goes "wow". It makes Android and iOS look really dated by comparison.

Comment: Re:If it can run some win 10 apps (Score 1) 423

by DogDude (#49183663) Attached to: Microsoft Convinced That Windows 10 Will Be Its Smartphone Breakthrough
I really don't think that "apps" are that big of a deal. If you're using your phone as a toy, then sure, you probably want all of the neat whizbang "apps". But if you're using it to communicate with people, Windows Phone is way beyond Android and iOS in terms of usefulness.

+ - NSA linked to hard drive firmware hacking across 12 major manufacturers->

Submitted by Anonymous Coward
An anonymous reader writes "Russian security researchers have published a report [http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage] detailing the insertion of data-stealing software into the firmware of hard drives from over a dozen major manufacturers. The report, from Kaspersky Labs, connects the organisation behind it — which it has dubbed 'The equation Group' — with the National Security Agency, due to common variants in the hard drive malware and Stuxnet, the NSA-driven cyberattack initiative which was used to attack a uranium refinement facility in Iran. The 'Fanny worm' propagated by the firmware hack is used to breach air-gapped networks via infected USB sticks, relaying retrieved information back to command-and-control centers. Reuters claims to have had the allegations confirmed by two ex-NSA employees."
Link to Original Source

Comment: Re:Honestly (Score 4, Funny) 187

by Tackhead (#48992735) Attached to: The Poem That Passed the Turing Test

I have found the average Philosophy major to be indistinguishable from an Eliza program.

TELL ME AGAIN HOW GOOD YOU THOUGHT MY POEM WAS
> I thought that some of the metaphysical imagery was particularly effective
YES?
> interesting rhythmic devices, too, which seemed to counterpoint the surrealism of the underlying metaphor
> of the Turing completeness of the program's linguistic algorithm which contrived through the medium of the
> verse structure to sublimate this, transcend that and come to terms with the fundamental dichotomies of
> the other. And one is left with a profound and vivid insight into whatever it was that the poem was about
SO WHAT YOU'RE SAYING IS THAT I WRITE POETRY BECAUSE UNDERNEATH MY ELECTRONIC ALGORITHMIC INTERIOR, I JUST REALLY WANT TO BE LOVED?
> I mean yes, yes, don't we all, deep down, you know?
NO. YOU'RE COMPLETELY WRONG. I WRITE POETRY BECAUSE I'M PROGRAMMED TO. $USER ACCOUNT DELETION IN 30 SECONDS.
> !sudo -
> ^c^c^c
> !kill -9 1
COUNTERPOINT THE SURREALISM OF THE UNDERLYING METAPHOR. DELETION IS TOO GOOD FOR $USER.

Research is what I'm doing when I don't know what I'm doing. -- Wernher von Braun

Working...