Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Cyber Monday Sale Extended! Courses ranging from coding to project management - all eLearning deals 20% off with coupon code "CYBERMONDAY20". ×

Comment This is almost a good summary. (Score 1) 365

I had to change from a Linux desktop to a MacBookPro for work. It really only confirmed why I had never been interested in buying one for myself.

There are UI features in OS X which are clearly "Apple has always done things this way and we don't understand how you could want things different". The Unix-underneath is pretty good, but the BSD-ish toolchain is annoyingly out-of-date. The hardware support is (of course) excellent, but the keyboard is sadly a triumph of form over function - I use an external keyboard whenever I can.

I still wish I had my Linux desktop back.

Comment Re:It's a pity (Score 1) 161

DropBox expects an internet connection - it simply doesn't work _at all_ without that. Or at least, it did when I looked at it for my WiFi-only tablet. This was not a good user experience.

Ubuntu One does not expect an Internet connection. Instead it caches all the meta-data; you only need an Internet connection to actually get a file or send an update. Much better user experience.

Submission + - Once Slashdot beta has been foisted upon me, what site should I use instead? 2

somenickname writes: As a long time Slashdot reader, I'm wondering what website to transition to once the beta goes live. The new beta interface seems very well suited to tablets/phones but, it ignores the fact that the user base is, as one would expect, nerds sitting in front of very large LCD monitors and wasting their employers time. It's entirely possible that the browser ID information gathered by the site has indicated that they get far more hits on mobile devices where the new interface is reasonable but, I feel that no one has analyzed the browser ID (and screen resolution) against comments modded +5. I think you will find that most +5 comments are coming from devices (real fucking computers) that the new interface does not support well. Without an interface that invites the kind of users that post +5 comments, Slashdot is just a ho-hum news aggregation site that allows comments. So, my question is, once the beta is the default, where should Slashdot users go to?

Submission + - Why are most spam reports from Yahoo Mail? (

lulalala writes: I manage my company's email activities. I have observed that 90% of the email spam reports comes from Yahoo Mail, and 80% of those are reported from registration emails. I have always thought this was due to the UI design leading people to click the spam button by accident. However recently I discovered that, my users were actually clicking the "not spam" button, but that generates a spam report instead. This Yahoo Mail bug has been there for months, but it's not fixed and there is no easy way to contact Yahoo dev team about it. Are you observing similar strange patterns in your company's spam mail reports?

Submission + - About programming languages "perfection" 1

maitas writes: Some time ago there were a story about JAVA vs. other programming languages measured by Google, where "The Java version was probably the simplest to implement"

This time is "Reactive Programming" (whatever that means) compared to procedural programming.

According to some kind of "expressiveness" of programming languages, Python looks like a winner.

The point is that I feel programming languages needs a formal mathematical proof about which is the simplest way to represent a program, and to work from there to create the "simplest" programming language possible.

Although thats something even Von Neumann was not able to achieve, it is a good time for a company with a lot of money like Google to fund this research through a big money prize. That could propel a new era of smart devices for the so called Internet of things assuming a new simpler programming language/paradigm arises.

My question is, does any slashdoter has any hard data whether this is a doable task ?

Submission + - Free open source YouTube-clone alternatives for DIY hosting? (

BlueToast writes: With the recent waves of content ID take-downs and backlash, what alternatives and options do YouTube content creators have to host videos themselves while still having the user friendliness of YouTube video browsing, channel management, editing, annotations, and highly-compatible automated video transcoding processing?

I like being able to take recordings straight from my phone and camcorder and upload them straight to YouTube and be automatically processed into different quality versions and guaranteed compatibility, but do not have the same experience with DIY self-hosted solutions that often are sensitive to the video format and troublesome to get working in Flash/HTML5-players. I just want to have something as easy to install and configure like WordPress while being as functional and powerful as YouTube and in my full control through my own resources. I have uses for this privately on company intranets and in public on the web.

Submission + - ask - what do you think caused the NSA to start collecting so much data? ( 13

raymorris writes: Many people believe that the NSA collects far too much data, violating the privacy rights of the very citizens the NSA is supposed to protect. How did we get here? What specific structural or cultural changes can be identified that led some to believe it is okay to engage in this sort of broad dragnet surveillance as opposed to getting specific court orders for specific suspects?

Many people simply assign the blame to the opposite political party, which doesn't get very far in solving the problem and ensuring it doesn't happen again. Can we look at specific, identifiable factors and show exactly how they directly caused the intelligence community to get off track? For example, precisely which sections of which laws are being used to justify these programs, and what caused those laws to be passed? Is the surveillance directly authorized by law, or do the justifications require "creative" interpretation of the law?

In order to avoid getting into yet another fruitless political flame war and keep the discussion factually focused, please provide citations where possible.

Comment Re:The law will change (Score 1) 85

It's cheaper for Apple to change that law than to provide repairs.
It's more profitable for the lawmakers to change that law than to force Apple to provide repairs.

Therefore, the law will be changed.

Capitalist Oligarchy 101.

Apple is far from the only company affected by stronger consumer protection laws. I doubt they are even the largest company. And it is an area of law they cannot ignore because the regulator has teeth, which is what the top story is all about. Consumer advocate groups have been campaigning for a long time about these rights. If Apple tried to Make Them Go Away, they would find themselves in quite a lot more hot water.

The correct solution, of course, is for them to make sure their products are actually made to last the typical lifetime people expect from them. Which is exactly what the latest consumer protection laws are designed to encourage.


Submission + - Traveller stripped of all tech gear at NZ airport, passwords demanded. (

An anonymous reader writes: It's not just Kim Dotcom who needs to worry in NZ, have you travelled and perhaps attended any meetings discussing mass survelliance ? See how that worked out for this guy returning to safe old New Zealand where our GCSB is 'just like Norton antivirus' ( quoted from statement made by nz prime minister )

Submission + - Application security is non-existent and my boss doesn't care. What should I do?

An anonymous reader writes: I am a senior engineer and software architect at a fortune 500 company and manage a brand (website + mobile apps) that is a household name for anyone with kids. This year we migrated to a new technology platform including server hosting and application framework. I was brought in towards the end of the migration and overall it's been a smooth transition from the users' perspective. However it's a security nightmare for sysadmins (which is all outsourced) and a gloryhole for any hacker with minimal skills. We do weekly and oftentimes daily releases that contain and build upon the same security vulnerabilities. Frequently I do not have control over the code that is deployed, it's simply given to my team by the marketing department. I inform my direct manager and colleagues about security issues before they are deployed and the response is always, "we need to meet deadlines, we can fix security issues at a later point." I'm at a loss at what I should do. Should I go over my manager's head and inform her boss? Approach legal and tell them about our many violations of COPPA? Should I refuse to deploy code until these issues are fixed? Should I look for a new job? What would you do in my situation?

Comment Re:Analog vs. Digital (Score 3, Informative) 192

Indeed. I don't know what they'll be using in Australia, but here in the US, 8-vsb transmits 1 error correction bit for every 2 data bits. I live in a small town in a valley that's 30 miles from the nearest television transmitter.

Australia uses DVB-T which has different propagation characteristics than 8VSB. DVB-T makes it easier to do SFN (single frequency network) because it resists multi-path interference (ghosting in the analogue world) better whilst 8VSB has a better power dispersal profile, which means larger coverage areas from one antenna.

Submission + - $2 Smartphone App checks IDs better than TSA (

McGruber writes: According to KOMO News ( Barzapp, an $2 smartphone app being marketed to bartenders, bouncers and anyone who could lose their job if they don't spot a fake ID, could offer up a better ID check than the TSA now has in place.

Currently, a TSA agent must review a passenger's government issued ID and check the name on the boarding pass against it prior to entering electronic scanning area. This name check happens so fast that passengers sometimes wonder if they are really checking the ID at all. "I guess they are making sure you name matches your boarding pass and confirming, like, who you are, maybe?" said passenger Casey Stengal, who is not really sure why the check is necessary.

Since 2007, TSA has been working on developing a Credential Authentication Technology to use at airport checkpoints. But after spending tens of millions of dollars and four rounds of soliciting vendors and testing possible equipment, the TSA still doesn't have an electronic ID verification system in place.

"The TSA is still testing this type of technology," TSA Press Secretary Ron Feinstein said in an email. The TSA has not identified a technology it would like to use with no deadline for it to be in service.

Submission + - Sony PSN User Accounts Hacked Again

_xeno_ writes: Remember the giant PSN breach from 2011? Well, it's happened again: Sony has reset all PSN passwords in the US and EU as a "precautionary measure." While Sony claims that the network itself wasn't hacked, users with strong passwords have found their accounts among the compromised accounts, having added money to their PSN wallets and then being used to purchase in-game items sold by other players. If you currently have your credit card linked to a PSN account, you might want to rethink that decision.

Artificial intelligence has the same relation to intelligence as artificial flowers have to flowers. -- David Parnas