Forgot your password?
typodupeerror

Comment: Re:Yes, Please (Score 1) 248

by stderr_dk (#47663589) Attached to: The IPv4 Internet Hiccups

My ISP supports IPv6, my router supposedly supports IPv6 (Asus RT-N66U), I can see the router getting an IPv6 address from my ISP, I can see my PC getting an IPv6 address from my router yet when I test it out on the various "do I have IPv6" pages it's failing.

After spending a couple of hours mucking around I gave up. I'll deal with it when it matters. Hopefully it's less painful then.

Quick question: Are those IPv6 addresses in the fe80::/10 range? Is so, they're link-local.

If not, would you mind sharing them or at least their routing prefix?

+ - "Word Record" as Single Laser and Fibre Optic Cable Delivers 43 Tbps

Submitted by Mark.JUK
Mark.JUK (1222360) writes "A research group working out of the Technical University of Denmark claims to have broken "another world record" in fibre optic data transfers after they were able to demonstrate speeds of 43 Terabits per second over a single laser and fibre optic cable (67km long), which is theoretically much closer to real-world connections than most other lab tests where multiple lasers and cables can be used.

Professor Leif Oxenløwe of DTU Fotonik said that his team had "used all the known, neat tricks that exist nowadays to make data in five dimensions: time, frequency, polarization, quadrature and space”. However one such "neat trick" is the decision not to use a traditional single core cable and to instead adopt a 7 core (glass threads) design from Japanese telecoms firm NNT.

Admittedly the new fibre optic cable does not take up any more space than the standard single-core version, but it's still a new cable and thus perhaps the "world record" claims aren't quite comparing apples to apples."

Comment: Re:What's up with Dice Developers (Score 1) 139

by stderr_dk (#46776767) Attached to: Code Quality: Open Source vs. Proprietary

its all ready is open sourced and that is what the soylent news guys did but the community didn't fallow.

Yes, SlashCode is open source, but the latest public release is 5 years old and not at all what's running on slashdot now.

It would be very nice, if Dice would release a newer version of the code, not only for SoylentNews, but also for the Japanese slashdot.jp and the Spanish barrapunto.com, both of them are still using the old version.

Comment: Re:Probably typical (Score 1) 121

by stderr_dk (#46745785) Attached to: 44% of Twitter Users Have Never Tweeted

If a name is a "real name", pay a one time charge by credit/debit card with the same name on it. This would put a green verified box next to the user name. The blue box will continue to be used for identities that twitter staff have verified on their own.

How much longer do you think the twitter staff is going to verify accounts on their own, if they can get people to pay instead?

If your answer to that question is longer than the time it took you to read the question, you're kidding yourself.

If a name is a nickname, pesudo-name, or a business/brand, then the user must mail a business card showing both the brand, twitter handle and name used.This would put a different color icon (maybe violet) that signifies that this has been professionally identified, and clicking on it should show the business card.

All that the latter does is verify that the twitter account is associated with the brand and not the reverse of the user verifying their name.

No. All it does is verify that the user had enough money to get one business card printed and mailed to Twitter.

Microsoft

They're Reading Your Mail: Microsoft's ToS, Windows 8 Leak, and Snooping 206

Posted by timothy
from the learned-it-from-watching-the-nsa dept.
After the recent Windows 8 leak by recently arrrested then-Microsoft employee Alex Kibkalo, Microsoft has tweaked its privacy policies, but also defended reading the email of the French blogger to whom Kibkalo sent the software. "The blogger in question, who remains unidentified, happened to use Hotmail—the investigation began in 2012 before Hotmail's Outlook.com transition—as his primary email account. So as part of its investigation, Microsoft peeked into the blogger's email account to read that person's correspondence with Kibkalo. ... Microsoft says it was justified in searching the blogger's email account, because it had probable cause to believe Kibkalo was funneling trade secrets to the blogger.The company also pointed out that even with its justification for searching the account, it would have been impossible to gain a court order." "The legal system wouldn't have let us" seems a strange argument to defend any act of snooping.

+ - Major Vulnerability In Tinder Dating App Allowed User Tracking

Submitted by Anonymous Coward
An anonymous reader writes "Include Security unveiled new research showing that users of the popular online dating app Tinder were at significant risk due to a vulnerability they discovered in the geo-location feature of the application. This vulnerability allowed Tinder users to track each another's exact location for much of 2013. Anyone with rudimentary programming skills could query the Tinder API directly and pull down the co-ordinates of any user. This resulted in a privacy violation for the users of the application."

+ - Exclusive: The Rags-To-Riches Tale Of How Jan Koum Built WhatsApp Into Facebook'->

Submitted by paulbes
paulbes (3229843) writes "Jan Koum picked a meaningful spot to sign the $19 billion deal to sell his company WhatsApp to Facebook earlier today. Koum, cofounder Brian Acton and venture capitalist Jim Goetz of Sequoia drove a few blocks from WhatsApp’s discreet headquarters in Mountain View to a disused white building across the railroad tracks, the former North County Social Services office where Koum, 37, once stood in line to collect food stamps. That’s where the three of them inked the agreement to sell their messaging phenom –which brought in a miniscule $20 million in revenue last year — to the world’s largest social network."
Link to Original Source
User Journal

Journal: Danger, Will Robinson! Scary stories within... 2

Journal by stderr_dk

The following submissions are apparently so scary that they can't be posted on Slashdot even though they get a good rating in the firehose.

It seems that /. do have "editors" after all, but their job ain't to edit the summaries like we thought editors were supposed to do. No, their real job is to hide all the scary stories from the /. crowd, who can't handle such things...

"Don't worry about people stealing your ideas. If your ideas are any good, you'll have to ram them down people's throats." -- Howard Aiken

Working...