Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:Industrial network (Score 1) 59 59

So my "follow the money" joke, really should be this. IF the people in charge are asking for it, find and suggest a solution that can do it safely. If they are not willing to pay for your solution, find another, albeit less safe solution and present it with a list of assumed risks. Rinse and repeat until you have a solution they are willing to pay for with risks they are accepting, then do that.

They want easy, and cheap. That limits you slightly...

Submission + - Slashdot by the People

turp182 writes: Slashdot by the People

Editors, please post to the front page if this get a response from the Firehose users. The response would help any potential buyer better understand the community, and the community could respond with insightful responses.

This is intended to be an idea generation story for how the community itself could purchase and then control Slashdot. If this happened I believe a lot of former users would at least come and take a look, and some of them would participate again.

This is not about improving the site, only about acquiring the site.

First, here's what we know:
1. DHI (Dice) paid $20 million for Slashdot, SourceForce, and Freecode, purchased from Geeknet back in 2012:
2. Slashdot has an Alexa Global Rank of 1,689, obtaining actual traffic numbers require money to see:
3. According to Quantcast, Slashdot has over 250,000 unique monthly views:
4. Per an Arstechnia article, Slashdot Media (Slashdot and Sourceforge) had 2015Q2 revenues of $1.7 million and have expected full year revenues of $15-$16 million (which doesn't make sense given the quarterly number):

Next, things we don't know:
0. Is Slashdot viable without a corporate owner? (the only question that matters)
1. What would DHI (Dice) sell Slashdot for? Would they split it from Sourceforge?
2. What are the hosting and equipment costs?
3. What are the personnel costs (editors, advertising salesforce, etc.)?
4. What other expenses does the site incur (legal for example)?
5. What is Slashdot's portion of the revenue of Slashdot Media?

These questions would need to be answered in order to valuate the site. Getting that info and performing the valuation would require expensive professional services.

What are possible ways we could proceed?

In my opinion, a non-profit organization would be the best route.

Finally, the hard part: Funding. Here are some ideas.

1. Benefactor(s) — It would be very nice to have people with some wealth that could help.
2. Crowdfunding/Kickstarter — I would contribute to such an effort I think a lot of Slashdotters would contribute. I think this would need to be a part of the funding rather than all of it.
3. Grants and Corporate Donations — Slashdot has a wide and varied membership and audience. We regularly see post from people that work at Google, Apple, and Microsoft. And at universities. We are developers (like me), scientists, experts, and also ordinary (also like me). A revived Slashdot could be a corporate cause in the world of tax deductions for companies.
4. ????
5. Profit!

Oh, the last thing: Is this even a relevant conversation?

I can't say. I think timing is the problem, with generating funds and access to financial information (probably won't get this without the funds) being the most critical barriers. Someone will buy the site, we're inside the top 2,000 global sites per info above.

The best solution, I believe, is to find a large corporate "sponsor" willing to help with the initial purchase and to be the recipient of any crowd sourcing funds to help repay them. The key is the site would have to have autonomy as a separate organization. They could have prime advertising space (so we should focus on IBM...) with the goal would be to repay the sponsor in full over time (no interest please?).

The second best is seeking a combination of "legal pledges" from companies/schools/organizations combined with crowd sourcing. This could get access to the necessary financials.

Also problematic, from a time perspective, a group of people would need to be formed to handle organization (managing fundraising/crowdsourcing) and interations with DHI (Dice). All volunteer for sure.

Is this even a relevant conversation? I say it is, I actually love Slashdot; it offers fun, entertaining, and enlightening conversation (I browse above the sewer), and I find the article selection interesting (this gyrates, but I still check a lot).

And to finish, the most critical question: Is Slashdot financially viable as an independent organization?

Submission + - Project IceStorm passes another milestone: building a CPU-> 2 2

beckman101 writes: FPGAs — specialized, high speed chips with large arrays of configurable logic — are usually highly proprietary. Anyone who has used one is familiar with the buggy and node-locked accompanying tools that FPGA manufacturers provide.
Project IceStorm aims to change that by reverse-engineering some Lattice FPGAs to produce an open-source toolchain, and today it passed a milestone. The J1 open-source CPU is building under IceStorm, and running on real hardware. The result is a fairly puny microcontroller, but possibly the world's most open one.

Link to Original Source

Submission + - The sad state of open IPCameras -> 2 2

criticalmess writes: I'm about to give up on any decent hardware to be found to roll my own web-based camera setup around the house and office — and thought that the nerds and experts at /. would be my last resource I could pull out.
Having bought multiple IPCamera (DLink, Abus, Axis, Foscam, TP-Link, ...) and always getting the "requires DirectX" treatment, I'm wondering if there are any open and affordable IPCams out there? I've been lookint at BlueCherry and their kickstarter campaign to create a complete opensource hardware solution (, I've been looking at Zavio ( as they seem to offer the streams in an open enough format while not breaking the bank on the hardware. Anything else I should be looking at?

I can't for the love of it understand why most of these hardware companies require you to run DirectX — anybody care to enlighten the crowd?

Should be simple enough really: hardware captures images, a small embedded webserver transforms this into an RTSP stream or HTTP stream, maybe on h264 or similar — done.

Link to Original Source

Submission + - FTC Accuses LifeLock of False AdvertisingAgain->

An anonymous reader writes: You may remember LifeLock — it's the identity protection company whose CEO published his social security number and dared people to steal his identity. Predictably, 13 different people succeeded. LifeLock was later sued for deceptive marketing practices, and eventually settled with the U.S. Federal Trade Commission to the tune of $12 million. Part of that settlement, of course, required that they refrain from misrepresenting their services in the future. Now, the FTC is taking action against them again, saying they failed to live up to that promise. The FTC claims (PDF) LifeLock falsely advertised that it "protected consumers’ sensitive data with the same high-level safeguards as financial institutions" and also failed to protect its users' data.
Link to Original Source

Submission + - Fossil fuels are messing with Carbon Dating->

Taco Cowboy writes: The element Carbon comes in several isotopes, with one of them the radioactive Carbon-14

Carbon-14 is formed when some of the atmospheric Nitrogen at the upper atmosphere is bombarded by cosmic radiation and break down into the unstable radioactive isotope of Carbon-14

The unstable isotope is brought to Earth by atmospheric activity, such as storms, and becomes fixed in the biosphere. Because it reacts identically to C-12 and C-13, C-14 becomes attached to complex organic molecules through photosynthesis in plants and becomes part of their molecular makeup. Animals eating those plants in turn absorb Carbon-14 as well as the stable isotopes. This process of ingesting C-14 continues as long as the plant or animal remains alive

The natural distribution of C-14 on planet Earth used to be about one part per trillion

The carbon dating method in determining the age of an artifact is based on the amount of radioactive carbon-14 isotopes

The C-14 within an organism is continually decaying into stable carbon isotopes, but since the organism is absorbing more C-14 during its life, the ratio of C-14 to C-12 remains about the same as the ratio in the atmosphere. When the organism dies, the ratio of C-14 within its carcass begins to gradually decrease. The rate of decrease is 1/2 the quantity at death every 5,730 years. That is the half-life of C-14 and that is the base on how Carbon Dating operates

The fossil fuel which we are burning are so old they do not have contain any traceable amount of C-14, and the more we use fossil fuel, the more non-C-14 Carbon we pump into the atmosphere

If emissions continue under a business-as-usual scenario, by year 2050 a T-Shirt made in that year (2050) will have a 'Carbon-14 emission' signature as a T-Shirt worn by William the Conqueror a thousand years (if William the Conqueror had a fetish for T-Shirt), for someone using the radiocarbon dating technique

Link to Original Source

Submission + - Woman recruited by Google four times and rejected, joins suit->

dcblogs writes: An Ivy league graduate, with a Ph.D. in geophysics, Cheryl Fillekes, who also specializes in Linux and Unix systems, was contacted by Google recruiters four separate times over a seven year period. In each instance, she did well enough on the phone interviews to get invited to an in-person interview but was rejected every time for a job. She has since joined an age discrimination lawsuit against Google filed about two months ago by another older worker. In the past year, Fillekes bought a dairy farm in upstate New York and designed and built an on-farm creamery.
Link to Original Source

Submission + - As Nations Hack Each Other, Protecting Personal Information Must Become Priority->

An anonymous reader writes: Foreign hackers are now in possession of security clearance documents that contain deeply personal secrets, and there is no way of reversing that. These individuals are caught in what Maj. Gen. Charles J. Dunlap has labeled the “hyper-personalization of war.” While there is nothing new about espionage or hacking, the size and depth of these attacks make them extremely serious. The ubiquity of technology and poor security have caused both crime and surveillance to skyrocket in frequency and specificity; those same factors are now also allowing intelligence agencies to infiltrate each others’ systems and societies. Nations are seeing identity databases as important targets for both offense and defense.
Link to Original Source

Like punning, programming is a play on words.