Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Slashdot Deals: Get The Fastest VPN For Your Internet Security Lifetime Subscription Of PureVPN at 88% off. ×

Comment Obviously (Score 4, Interesting) 360

Is it really a surprise that a failing business like Yahoo! would ignore its users in an attempt to make money?

Look, the obvious lesson here is that no business can be trusted to keep secrets. Also: Water is wet, fire is hot. Don't give out anything you don't want to get out there, no matter what some PHB promises you.

Comment Increasingly inappropriately name (Score 4, Insightful) 396

At some point, we're going to have to accept that the devices we carry around with us aren't really "phones" anymore. They're powerful computers that happen to be able to make the odd phone call in between accessing the internet, playing games, taking photos and storing data.

That established, I'm pretty happy with my iPhone 4s. The glaring omission is turn-by-turn directions -- I consider it a public safety issue when I see people looking down at their phones trying to figure out what exit they need to get off on.

Comment Re:Laptops are easy. (Score 4, Interesting) 138

I work for a large company, large enough that I see people I don't recognize on our campus every single day.

Two years ago this weekend (Presidents Day, which is a holiday at our office) we had an enterprising thief roll a cart around our office around 5 PM on Friday, loading up laptops. Of course, by then most everyone had skipped out for their long weekend, but if someone was in the office he'd tell them it was for the "weekend virus scanner upgrade", promising people that their machines would be back on Tuesday morning.

I don't know this part for a fact -- our security people and management don't talk about this at all -- but I've heard it enough that I believe it: When someone objected to having their laptop taken, he'd act irritated and ask why they "didn't reply to any of the emails about the upgrade" and then make a show of updating his clipboard -- he'd collect the asset tag from the machine, office number and actually get the person to sign on the line.

I have no idea how many machines he made off with, but it was enough that we all had to suffer new BS security procedures for a year afterword. I would imagine that you could do this at pretty much any big office and get away with it.

Role Playing (Games)

The Elder Scrolls V: Skyrim Announced for November 2011 231

Bethesda took advantage of the Video Game Awards this weekend to announce the fifth installment of the Elder Scrolls series, titled Skyrim. The game is planned for November 2011, and a teaser trailer has been posted on the Elder Scrolls website. Details are sparse, though the game will apparently run on an "all-new" engine.

Comment Re:Library of Congress (Score 1) 163

Or better yet, how many Library of Conresses (Conressi?) can be moved by all those trains.

Hey, Google returns 1,500 results for Library of Conress!

  • Are we talking about data only, or books as well?
  • Are the data going to be stored in flash devices or hard drives in those trains?
  • If using hard drives, are they going to be stored in vibration-dampening cages?
  • If using flash memory cards, are they going to be attached to birds?
  • Are the birds flying free or packed in cages?

There's my questions.

Comment During the SARS period (Score 5, Interesting) 123

During the highly-infectious SARS period in 2003, several countries in East Asia were in a state of emergency. N95-rated respirator masks were in extreme short supply.

One bra-manufacturing factory in Taiwan quickly modified its process and churned out masks instead - using the cup and straps as its basic design.

It was a godsend among the Taiwanese who were greatly desperate for protection against the deadly virus, which spreads via tiny droplets of saliva sneezed/coughed into the air.

Comment Re:What a moron (Score 1) 440

I've RTFA'ed. The article is nothing more than a thought experiment. He stated very clearly several times in the article that he does not recommend this.

From the last paragraph:

I won’t be doing this on my network, because I prefer to keep the default security in place... I’m a total advocate of the layered-onion approach to security within a company ...

The Slashdot summary has given us a wrong impression of the article's intention. It's nothing more than a thought experiment.

The clothes have no emperor. -- C.A.R. Hoare, commenting on ADA.