Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Yale course "Game Theory" on Youtube (Score 2) 152 152

Here is the complete Youtube playlist for the Yale course "Game Theory", lectured by Ben Polak. 24 lectures in total, about 1 h 15 min each.

Course description: This course is an introduction to game theory and strategic thinking. Ideas such as dominance, backward induction, Nash equilibrium, evolutionary stability, commitment, credibility, asymmetric information, adverse selection, and signaling are discussed and applied to games played in class and to examples drawn from economics, politics, the movies, and elsewhere.

I have had the intention of watching through this, but haven't had the time after the first few lectures. The material is recommended, though.

http://www.youtube.com/playlist?list=PL6EF60E1027E1A10B

Comment: Hacked hardware? (Score 5, Interesting) 329 329

Since the origin of the computers is unknown, the hardware cannot be trusted. The computers might be hacked and backdoored on the BIOS level. Modern BIOSes are quite sophisticated with a rich functionality, that can be misused invisibly from the OS' point of view.

Comment: Very unfortunate... (Score 0, Redundant) 426 426

"Next-Gen Nuclear Power Plant Breaks Ground In China"

Oh no, that is very unfortunate, I'm sad to hear about the breakage.

Do they yet know how much ground has been broken? Is it severely broken?

I suspect that this has been caused by the atomic radiation from the power plant.

Let's hope that the Chinese can get that ground fixed, they need all the space they need as there are so many of them.

Comment: Privacy options (Score 1) 474 474

You seem to worry much about losing your privacy. Most social networking sites have rather extensive privacy settings, so you get to select in detail what should be revealed and to whom.

The problem of course then is that managing these privacy settings can be quite tricky, if you don't have a clear picture of what knobs you have available to turn.

Here is a rather recent and extensive walk-through of the most central privacy settings Facebook offers:

http://www.allfacebook.com/2009/02/facebook-privacy/

Comment: Two separate things here... (Score 3, Insightful) 194 194

As I understood, the colo in question was not shut down per se, it was simply severed from its internet connectivity as its upstream/backbone internet providers terminated their contract with them. Nothing special about that; business relationships are initiated and terminated all over the world every day.

Consequently, there was no "vigilanteism" in the strict sense as such, where normals citizens take the law in their own hands and act as if they had higher authority than they really have.

It was simply a case of concerned security researchers going to the upstream providers with evidence and saying "look what scum you do business with by providing connectivity, this is bad for the internet on the whole and it hurts your reputation", and the ISPs in question took action. If innocent customers of the rouge colo got hurt when the lines got cut, then they simply have to suffer the consequences of picking a bad host to buy services from.

Of course, if the proof the security researchers had gathered also proved that the shut-down colo in question had committed crimes, then the appropriate authorities need to be involved. But that is another chain of events, separate from the disconnection of the lines.

Security

Thinking of Security Vulnerabilities As Defects 158 158

SecureThroughObscure writes "ZDNet Zero-Day blogger Nate McFeters has asked the question, 'Should vulnerabilities be treated as defects?' McFeters claims that if vulnerabilities were treated as product defects, companies would have an effective way of forcing developers and business units to focus on security issue. McFeters suggests providing bonuses for good developers, and taking away from bonuses for those that can't keep up. It's an interesting approach that if used, might force companies to take a stronger stance on security related issues."

Your good nature will bring you unbounded happiness.

Working...