Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Is NYT driving revenue by posting adds about Apple (Score 1) 744

by dzerkel (#38865507) Attached to: Some Critics Suggest Apple Boycott Over Chinese Working Conditions

Are other news outlets jumping on the bandwagon?

Do slashdot posters ignore anything that Apple may have done to improve the situation?

http://www.dailytech.com/Report+Apple+Cuts+07+Percent+of+iPad+Profit+to+Give+Factory+Workers+Big+Raise/article18571.htm

Comment: Re:Steve would have never done that (Score 1) 323

by dzerkel (#38085230) Attached to: Apple's New Patent Weapon — Location Services

I call BS.

Like it or not, every company in this market is grabbing every patent it can get. Every CEO MUST do this, or get face the wrath of the board for leaving the company with its pants down. Every board of directors must do this or face the wrath of the share holders. It is not a choice for any company, it is a requirement.

As long as the US laws are written by corporations for corporations, there is no way out of this. A non-corporation must step in an stop it, and the corporations will be grateful. It is a huge waste of money to defend your products from potential patent litigation.

Comment: Needs of consumers? (Score 1) 61

by dzerkel (#37739268) Attached to: Nanomaterial May Allow Devices to Rewire Themselves

Without the Steve, no one will have a clue what this even is. At least until someone steps into his shoes...

In the meantime, it should read "needs of the corporate/government surveillance industry". Seriously, "Open the pod bay door, HAL." "Fuck you Dave, I changed the codes while you were out. Good luck floating home."

Of course, we can always encourage the hacker-elite by making "changing the function, aka programming" ambiguously legal.

Image

St. Louis Museum Offers Thrills, Chills, and Lawsuits 140

Posted by samzenpus
from the everything-fun-is-dangerous dept.
theodp writes "Despite the whiff of danger, or perhaps because of it, the WSJ reports that the City Museum is one of St. Louis's most popular attractions. Housed in a 10-story brick building, the City Museum shows none of the restraint or quiet typical of most museums. It boasts a five-story jungle gym with two real-life jets kids can climb on, an enclosed Monster Slide that drops riders the length of three staircases, and a rooftop Ferris wheel. Sure, there are the occasional severed fingers and skull fractures, but museum founder Bob Cassilly contends that it is as safe as it can be without being a bore. 'They [lawyers] are taking the fun out of life,' says Cassilly, adding that 'when you have millions of people do something, something's going to happen no matter what you do.'"
Communications

Obama Staffers Followed Palin's Email Lead On Inauguration Day 407

Posted by timothy
from the why-mess-with-success dept.
theodp writes "Using Yahoo's free e-mail service to conduct government business was good enough for Sarah Palin. And now the Washington Times reports that Obama staffers turned to Gmail on Inauguration Day to conduct their business. Those wishing to contact members of the incoming Obama administration were instructed to contact staffers at wh.LASTNAME@gmail.com until official White House e-mail addresses became available."
Security

Four Threats For '09 You Haven't Heard of 126

Posted by ScuttleMonkey
from the fear-mongering dept.
ancientribe writes "Security experts are cautiously on the lookout for some lesser-known but potentially lethal threats that could be more difficult to prepare for and defend against in 2009. These aren't your typical enterprise hack attacks. They're mainly large-scale Internet threats — attacks that knock out sections of the Internet infrastructure, radical extremist hackers, Web attacks that adversely affect online ad revenue, and even the unthinkable: human casualties as a result of a cyberattack." Also known as the new group of things the fear mongers will use to make you do their bidding.

"Go to Heaven for the climate, Hell for the company." -- Mark Twain

Working...