This book supports many of you observations: Slack: Getting Past Burnout, Busywork, and the Myth of Total Efficiency , and many others. Every engineer working in the environment described above should invest on themselves and buy this book. It will open their eyes!
r0.ini writes: Prey proyect has a new version out, now it "officially supports Wifi geolocation for Mac, Windows and Linux PCs". Happy hunting!
andylim writes "Several universities and commercial entities are developing multimodal, multitouch games, such as a card game using iPhones for individual hands and an iPad for public information, and an iPad Scrabble game that lets you use your iPhone to see your letter tiles. Of course, it's an extremely expensive setup right now, but over time it will become cheaper. It's also pretty cool, so why wouldn't you want to play board/card/strategy games like this?"
If you need a real flexible smtp daemon, and can program in perl, I would recommend qpsmtd. Give it a try, you can create your own plugins (to handle spam or whatever you need) so easily you won't believe it.
jkcity writes "In a bizarre move Aurora Technology the owners of the King of the World MMORPG has taken the unusual step of banning men who play women characters but the ban itself does not stretch to women playing men. If you want to play as a woman now in game you have to prove you are a women via web cam. This is something that people ask for in many mmorpgs I myself have seen people say people who play women in EVE online as being some kind of degenerate but how long can a policy of verification by web cam last since its so easy to get around it doesn't seem to solve much and is an insult to many."
Pride Goes Before a Fall writes: It hasn't been a good week for the anti-P2P company MediaDefender. Fresh after the devastating leaks of their internal emails, their Gnutella tracking database, and their phone call with the New York Attorney General over an anti-child pornography project, now Wired reports that MediaDefender's source code is on the Pirate Bay for anyone to download. Given that MediaDefender joked about their own inability to put a dent in online copyright infringement, one wonders why companies trust these folks to fight copyright infringement when they can't even stop the torrent with their own worst secrets in it?
Link to Original Source
Link to Original Source
thefickler writes: For a company that's been set up to stealthily protect the intellectual property of its clients, Media Defender doesn't seem to be too good at protecting its own intellectual property. Its suite of anti-piracy tools has been leaked onto the BitTorrent peer-to-peer (P2P) network. The leak comes just a week after 700MB of MediaDefender's internal emails were leaked.
darkreadingman writes: "First-person account of how a penetration testing company caught an executive stealing data from his company. After discovering that the pen testers were making off with his laptop, this executive attacked two security experts, wrestled his laptop away, and tried to delete the incriminating data before the guards arrived. A real lesson in what happens when insiders are caught red-handed, with the smoking gun (or in this case, a smoking laptop) in their hands. http://www.darkreading.com/document.asp?doc_id=11
An anonymous reader writes: The impact of heavy use and high temperatures on hard disk drive failure may be overstated, says a report by three Google engineers. The report examined 100,000 commercial hard drives, ranging from 80GB to 400GB in capacity, used at Google since 2001. From the article: "The report also looked at the impact of scan errors — problems found on the surface of a disc — on hard drive failure. "We find that the group of drives with scan errors are 10 times more likely to fail than the group with no errors," said the authors. They added: "After the first scan error, drives are 39 times more likely to fail within 60 days than drives without scan errors."