Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:FUD at least sort of. (Score 4, Informative) 198

But if you are worried about it transmitting when off, it's actually very easy to check with packet sniffers. This really shouldn't even be a he said she said argument. There is a really clear and simple way to test this:

1. Turn Nest Camera to "off" mode, ie the Green LED is off. 2. Start up wireshark and see if the Nest Camera is transmitting to the anything and where it's transmitting to.

Now, repeat the above with the Nest fully turned on. Compare the packets captured. Is the camera talking to the same servers and transmitting similar amount of data?

You can tell much more objectively this way then speculating what is or isn't doing based on power usage.

Comment Re:non-story (Score 1) 198

I like how the people posting blatant lies post anonymously :)

First of all, there is a difference between the camera being powered on and recording. It's like leaving your camera on but not hitting the shutter. The camera is on, but nothing is being saved anywhere.

Second, you can delete your videos. You can do it on the old dropcams to the new Nest Cams. See the support site if you don't know how to do it.

If you are worried about the fact that it can take a few days for all the copies in the distributed cloud to be deleted, then yes, when you host the amount of data that Google does, it's going to take some time for all the replicated copies to be deleted. Cloud infrastructure is pretty complicated.

Comment Re:nice little dig at the end (Score 3, Informative) 109

There is no need, there is already a separate law for that, they can call you a traitor. And the consequences are much worse than anything in this law. In that case, they can just arrest you and put you in jail. Why would they use this law where they have to try you in court first? And there is no prison term attached to this law, only some fines.

Comment Re:WTF does that mean? (Score 4, Interesting) 222

Actually, I'm pretty sure that Google can theoretically sublicense it to other entities not related to Google. But I doubt that's what happened. Google has this clause so they can pick up awesome videos and use it in commercials without getting sued for infringement. As that would actually mean sublicensing the content from Google to a media firm. Besides, Google+ is not a subsidiary of Google, neither is Youtube. They are just products offered by Google. They don't need to sublicense it to move it form one service or another.

But yes, the Youtube Standard License give Google the right to sublicense and distribute not anyone viewing the videos. So if you download a video that's not yours on Standard YouTube License from YouTube and then upload it to your website without using the YouTube link you are actually pirating. If you use the YouTube container (ie it's actually streaming from YouTube) then you are getting a sublicense which is not pirating.

Comment Policies are not only for banning use of PEDs (Score 1) 227

Of all the firms I've worked at, we've allowed the use of PEDs. From the survey, it seems like the only policy possible was one that bans PEDs. I feel like the survey should specifically ask if PEDs are banned. Because my company has a policy regarding PEDs in place, but they do not ban PEDs. There are device management policies in place instead. I think the survey would benefit from making that distinction.

Comment Re:Why use ISP email? (Score 1) 269

But then that's like saying why are we using iPhones or Android devices, they might go away in the future. Just because in 2035 you wouldn't want to use the services/product doesn't mean you should avoid them now. Anyway, Gmail is part of Google's Apps for Work platform, so it will be supported long after we stop caring about it because there will be companies paying for it.

Comment Why not let him know what to do (Score 4, Insightful) 279

If he is not a disgruntled worker just work with him to set up expectations from the IT side of things. Do you expect him to turn his computer in? When? Should he delete files off? Yes/No? I think most people would be happy to work though an exit checklist and it would make you seem really organized. But if the employee has it in for you, then you may want to do more than that. But it looks like you've already made back ups of things that you think may be important. In any case, I would formulate a standard policy for people leaving the firm. So that they have clear expectations on what needs to be done on the IT side of things.

Submission + - Google's DeepMind developing artificial intelligent video game players (

misosoup7 writes: Smart programs have been beating humans are various games since the early 90's. The problem is that these programs are specialized and can only do one thing. The Deep Blue chess computer can only play chess, not even tic-tac-toe. The Google DeepMind team now has made a breakthrough against this "narrow" intelligence problem by creating an AI that can perform well across a variety of games. Published in Nature, the team describes their new algorithm. And you can watch the program play Space Invaders and Breakout at the bottom in the attached videos.

Submission + - New DDoS Attack And Tools Use Google Maps Plugin As Proxy

An anonymous reader writes: Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks. A known vulnerability in a Google Maps plugin for Joomla allows the plugin to act as a proxy. Attackers spoof (fake) the source of the requests, causing the results to be sent from the proxy to someone else – their denial of service target. The true source of the attack remains unknown, because the attack traffic appears to come from the Joomla servers.

Submission + - New Icons of Windows 10 Do Not Please Users Aesthetically ( 2

jones_supa writes: A lot of people got nauseous about the flat looks of Modern UI presented in Windows 8. Recent builds of Windows 10 Technical Preview have now started replacing the shell icons, and to some people they are just too much to bear. Basically, Microsoft opted to change the icons in search of a fresh and modern look, but there are plenty of people out there who claim that all these new icons are actually very ugly and the company would better stick to the previous design. To find out what people think about these icons, Softpedia asked its readers to tell their opinion and the messages received in the last couple of days pretty much speak for themselves. There are only few testers who think that these icons look good, but the majority wants Microsoft to change them before the final version of the operating system comes out.

Comment I don't think it's really a security audit (Score 1) 114

The Chinese is most likely doing this as a response to the US banning ZTE and Huawei telecom products in the US. The US government is accusing ZTE and Huawei of building backdoors and other security concerns into their hardware, so China wants to hit back with something equally annoying. China is basically saying that's cool, we can screw with your companies too. Especially since China is a huge market to cell phone makers that most US companies have yet to really tap into. And with a huge growing middle class, the amount of profit for products like iPhone and Android based phones is huge. China is basically holding the iPhone hostage to get better treatment of its companies outside of China.

Let's organize this thing and take all the fun out of it.