Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:Nothing new (Score 1) 992 992

That was closer to 15 years ago now. I wish we could have "reasonable and prudent" back. We had to abandon it because we have such a small population and therefore tax base, and the Feds yanked our highway funding until we put in a speed limit.

Reasonable and prudent meant people weren't trying to go 70 mph over a mountain pass in the winter. It also meant I could go 110 mph on a sunny day on an empty stretch of road if it and my vehicle were in good shape.

Comment Re:Yeah but... (Score 1) 992 992

It was not "NO SPEED LIMITS" it was "reasonable and prudent". This has some benefits most don't consider, primarily in that with no posted speed limit, people don't feel compelled to go that speed when conditions do not permit. Montana has hundreds of miles of twisty, narrow roads that are poorly maintained and very dangerous when icy, which in some parts can be 8 months out of the year. If you were going 100 mph on a road in a shitbox car and clearly not in full control of the vehicle you were pulled over and the fine was enormous. "Reasonable and Prudent" was much safer than a flat 85 MPH.

Facebook Malware Goes Viral 123 123

itwbennett writes "Just a few hours after a fake CNN news report appeared on Facebook Friday, more than 60,000 users had gone to the spoofed, malware bearing page according to Sophos Senior Security Advisor Chester Wisniewski. Facebook didn't respond to IDG News Service's request for information on 'how widespread the problem was or whether its own security had been breached, but Wisniewski said that there are a number of ways that status updates could appear without users' knowledge.'"

Submission + - Laid-off IT worker accused of hacking, crashing Mi->

steampoweredlawngnom writes: When multiple computer servers crashed nearly simultaneously on Nov. 2 at Edulog, the Missoula firm says it sought help from a former information technology administrator who had been laid off about a week earlier.

Now, Missoula County authorities allege it was that man, Vladimir Ivanovich Shved, who hacked into the computers in the first place, took the servers down and erased backup servers.

Charles Stortz, Logistics Vice President, says at no time was the law enforcement client data compromised or in jeopardy.

Link to Original Source

Submission + - Has Earth's Sixth Mass Extinction Already Arrived?->

intellitech writes: With the steep decline in the populations of many species, some scientists have warned that Earth is on the brink of a mass extinction like those that have occurred only five times in the past 540 million years. In a study to be published in the March 3 issue of the journal Nature, University of California, Berkeley, paleobiologists assess where mammals and other species stand today in terms of possible extinction, compared with the past 540 million years, and they find cause for hope as well as alarm.
Link to Original Source

China Building City For Cloud Computing 142 142

CWmike writes "First it was China's 'big hole' sighting that brought us the supercomputing race. Now China is building a city-sized cloud computing and office complex that will include a mega data center, one of the projects fueling that country's double-digit growth in IT spending. The entire complex will cover some 6.2 million square feet, with the initial data center space accounting for approximately 646,000 square feet, says IBM, which is collaborating with a Chinese company to build it. A Sputnik moment? Patrick Thibodeau reports that these big projects, whether supercomputers or sprawling software development office parks, can garner a lot of attention. But China's overall level of IT spending, while growing rapidly, is only one-fifth that of the US."

Next Generation of Algorithms Inspired by Ants 106 106

letsurock writes "Ants' capability to find the shortest route through a maze in an hour, and to find the second shortest route when the first path was obstructed, has inspired researchers creating algorithms for the future. From the article: 'Finding the most efficient path through a busy network is a common challenge faced by delivery drivers, telephone routers and engineers. To solve these optimization problems using software, computer scientists have often sought inspiration from ant colonies in nature — creating algorithms that simulate the behavior of ants who find the most efficient routes from their nests to food sources by following each other's volatile pheromone trails. The most widely used of these ant-inspired algorithms is known as Ant Colony Optimization (ACO).'"

Submission + - Retailer accused of inflating Google rank arrested-> 1 1

alphadogg writes: An online retailer who boasted that complaints about his business helped boost its standing in Google search results was arrested Monday.

Vitaly Borker, 34, was arrested at his home in Brooklyn, New York, and charged with fraud, cyberstalking and harassment, the U.S. Department of Justice said. He faces up to 20 years in prison.

According to the complaint against him and a profile that appeared in The New York Times last month, Borker made abusive customer service his signature style. Prosecutors say he shipped counterfeit or defective products and threatened customers with violence if they complained.

It was all part of a scheme to boost his online presence by getting people to discuss and link to his online store. Even if the links came from people complaining about his business it still drove traffic to the website.

Link to Original Source

Submission + - Comcast hit with second major outage in 8 days->

ctmurray writes: Comcast cut off the upper midwest from the internet last night for 4 hours due to a DNS breakdown (including me). And this was the second outage for the same reason in 8 days, with the east coast going down on Cyber Monday. Apparently I could have surfed if I had known to switch to OpenDNS or Google's DNS, but there was nothing on the TV and Comcast phones were tied up. Not knowing this was widespread I ran through the standard song and dance of unplugging the modem and my wifi unit and waiting for them to reset. I had to call friends and do a survey to determine this was widespread. I know this is old news but I could not find any comments on /. I think the comments by /. ers would be interesting.
Link to Original Source
The Almighty Buck

Submission + - Selling source code? 5 5

doesntbyte writes: I figured a lot of people on Slashdot have probably faced this before: I work as a freelance programmer and, over the years, I've compiled a huge collection of libraries and algorithms that I've developed to make my life easier. Anything from a calendaring application in Java to simple C++ file I/O stuff. It occurred to me: These programs/libraries/whatever are hugely useful for me and, if I cleaned them up a little bit, they'd probably help other programmers too. I thought about OpenSourcing them but, honestly, in this economic climate my finances aren't doing so well either.

So, Slashdot, I was wondering: Is there any way to easily sell source code to other programmers? Some people have pointed me to RentACoder or ScriptLance but they're not quite what I'm looking for since that's (basically) selling future work. Is there anything that's for selling pre-written code? Someone pointed me to SourceSale but that doesn't look like it's got much going on yet. Any other suggestions? I thought of just doing an opensource page with a PayPal donation link, but... That seems like it wouldn't actually result in very significant financial results. Help?

Submission + - Hacking Java from the inside out->

An anonymous reader writes: "The final release of JavaSnoop 1.0 came on Monday, after months of revisions and fixes since it was first announced at Black Hat this summer. The tool is the creation of Arshan Dabirsiaghi, director of research at Aspect Security, and it's meant to give developers, researchers and other interested parties the ability to do a number of interesting things with Java applications that normally aren't possible without having the source code at hand.

"The whole idea of JavaSnoop is to turn theoretical vulnerabilities into real vulnerabilities," he said in his presentation at Black Hat. "Theoretical vulns don't really get fixed at the same rate that real vulns do."

Link to Original Source

Submission + - From: Dr. Dennis Fetko, "Dr. Dog"->

An anonymous reader writes: “How to finally eliminate your dog’s annoying behaviors—and why you may actually be teaching him these behaviorswithout even realizing it!”
If your dog chews up the couch ... jumps on your guests ... barks excessively ... digs up the yard soils indiscriminately ... pulls on a lead ... or exhibits any number of other annoying and destructive behaviors, you will learn here how to eliminate these behaviors without resorting to yelling ... swearing ... hitting ... or jerking (and save yourself a boatload of frustration) once you learn the secrets of “dog talk.”

Link to Original Source

Submission + - Australian web hosts wouldn’t host WikiLeaks->

An anonymous reader writes: After being dumped by Amazon, Wikileaks mirrors have sprung up all over the world ... except in Australia, where local web hosting companies say they probably wouldn't play host to a mirror of the site due to technical and legal concerns. Is this a valid stance, or should web hosting companies take a braver stance on the issue and remain agnostic about the content they're hosting?
Link to Original Source

"Why waste negative entropy on comments, when you could use the same entropy to create bugs instead?" -- Steve Elias