Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Where data is stored (Score 1) 241

by darealpat (#36395324) Attached to: Google Asks 'Who Cares Where Your Data Is?'

...does impact on security (real and perceived, which impacts on trust).

One can say that it is more important to trust the provider of the data storage than to trust the location. What makes any particular location untrustworthy if not the security that one can bring to bear? One provider may simply not be able to be as disciplined with their security protocols than another, while being in an area that is deemed to be more secure...like comparing Palo Alto and Namibia.


Microsoft Ready To Talk Windows On ARM 342

Posted by timothy
from the hole-in-the-marketshare-dike dept.
An anonymous reader writes "After many months of working in secret, Microsoft is nearly ready to start talking about its plans to bring Windows to ARM-based processors. However, while the company is set to discuss the effort at next month's Consumer Electronics Show, there is still a lot that must be done before such products can hit the market. Among the steps needed is for hardware makers to create ARM-compatible drivers, a time-consuming effort that explains in part why Microsoft is talking about the initiative well ahead of any products being ready. Meanwhile, Ubuntu is already starting to ship on some ARM devices and running on many others."
The Internet

Bank of America Buying Abusive Domain Names 249

Posted by timothy
from the get-out-your-thesaurus dept.
Nite_Hawk writes "Bank of America has snapped up hundreds of abusive domain names for its senior executives and board members in what is being perceived as a defensive strategy against the future publication of damaging insider info from whistleblowing website WikiLeaks. According to Domain Name Wire, the US bank has been aggressively registering domain names including its board of directors' and senior executives' names followed by 'sucks' and 'blows.'"

10 Dos and Don'ts To Make Sysadmins' Lives Easier 246

Posted by timothy
from the sorry-dave-can't-let-you-do-that dept.
CowboyRobot writes "Tom Limoncelli has a piece in 'Queue' summarizing the Computer-Human Interaction for Management of Information Technology's list of how to make software that is easy to install, maintain, and upgrade. FTA: '#2. DON'T make the administrative interface a GUI. System administrators need a command-line tool for constructing repeatable processes. Procedures are best documented by providing commands that we can copy and paste from the procedure document to the command line.'"
The Media

BYTE Is Coming Back 185

Posted by timothy
from the has-it-been-12-years-already dept.
harrymcc writes "More than a dozen years after its death, BYTE magazine is still the most beloved computer magazine of all time — the one that employees of every other tech mag got used to being compared unfavorably with. And now it's being revived, in the form of a new BYTE.com. The new version isn't replicating the focus of the old BYTE — it's focused on the use of consumer tech products in a business environment — and I'm pretty positive it won't feature Robert Tinney's art or epic Jerry Pournelle columns. But I'm glad to see the legendary brand back in use rather than sitting in limbo."

New Windows Kernel Vulnerability Bypasses UAC 303

Posted by timothy
from the happy-thanksgiving-everyone dept.
xsee writes "A new vulnerability in the Windows kernel was disclosed Wednesday that could allow malware to attain administrative privileges by bypassing User Account Control (UAC). Combined with the unpatched Internet Explorer vulnerability in the wild this could be a very bad omen for Windows users."
Social Networks

The Ethics of Social Games 75

Posted by Soulskill
from the push-button-for-endorphins dept.
Gamespot is running a story about the ethics and morality of the social games market, which in recent years has exploded to involve hundreds of millions of players. Between micro-transactions, getting players to recruit friends, and the thin line between compelling games and addictive games, there are plenty of opportunities for developers to stray into shady practices. Quoting: "The most successful social games to date have used very simple gameplay mechanics, encouraging neither strategy nor dexterity but regular interaction with the game ... Although undeniably successful, the existing social game framework has been the subject of much debate among game developers from every corner of the game industry, from the mainstream to the indie community. Some, like Super Meat Boy creator Edmund McMillen, are particularly strident in their assessment. 'Social games tend to have a really seedy and abusive means of manipulation that they use to rope people in and keep them in,' McMillen said. 'People are so tricked into that that they'll actually spend real money on something that does absolutely nothing, nothing at all.'

Oh, so there you are!