Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Yale course "Game Theory" on Youtube (Score 2) 152

by tsvk (#37524278) Attached to: Ask Slashdot: Best Way To Learn About Game Theory and AI?

Here is the complete Youtube playlist for the Yale course "Game Theory", lectured by Ben Polak. 24 lectures in total, about 1 h 15 min each.

Course description: This course is an introduction to game theory and strategic thinking. Ideas such as dominance, backward induction, Nash equilibrium, evolutionary stability, commitment, credibility, asymmetric information, adverse selection, and signaling are discussed and applied to games played in class and to examples drawn from economics, politics, the movies, and elsewhere.

I have had the intention of watching through this, but haven't had the time after the first few lectures. The material is recommended, though.

Comment: Very unfortunate... (Score 0, Redundant) 426

by tsvk (#27642959) Attached to: Next-Gen Nuclear Power Plant Breaks Ground In China

"Next-Gen Nuclear Power Plant Breaks Ground In China"

Oh no, that is very unfortunate, I'm sad to hear about the breakage.

Do they yet know how much ground has been broken? Is it severely broken?

I suspect that this has been caused by the atomic radiation from the power plant.

Let's hope that the Chinese can get that ground fixed, they need all the space they need as there are so many of them.

Comment: Privacy options (Score 1) 474

by tsvk (#26951639) Attached to: Linked In Or Out?

You seem to worry much about losing your privacy. Most social networking sites have rather extensive privacy settings, so you get to select in detail what should be revealed and to whom.

The problem of course then is that managing these privacy settings can be quite tricky, if you don't have a clear picture of what knobs you have available to turn.

Here is a rather recent and extensive walk-through of the most central privacy settings Facebook offers:

Comment: Two separate things here... (Score 3, Insightful) 194

by tsvk (#25794099) Attached to: McColo Takedown, Vigilantes Or Neighborhood Watch?

As I understood, the colo in question was not shut down per se, it was simply severed from its internet connectivity as its upstream/backbone internet providers terminated their contract with them. Nothing special about that; business relationships are initiated and terminated all over the world every day.

Consequently, there was no "vigilanteism" in the strict sense as such, where normals citizens take the law in their own hands and act as if they had higher authority than they really have.

It was simply a case of concerned security researchers going to the upstream providers with evidence and saying "look what scum you do business with by providing connectivity, this is bad for the internet on the whole and it hurts your reputation", and the ISPs in question took action. If innocent customers of the rouge colo got hurt when the lines got cut, then they simply have to suffer the consequences of picking a bad host to buy services from.

Of course, if the proof the security researchers had gathered also proved that the shut-down colo in question had committed crimes, then the appropriate authorities need to be involved. But that is another chain of events, separate from the disconnection of the lines.


Thinking of Security Vulnerabilities As Defects 158

Posted by timothy
from the doesn't-everyone-already-think-that dept.
SecureThroughObscure writes "ZDNet Zero-Day blogger Nate McFeters has asked the question, 'Should vulnerabilities be treated as defects?' McFeters claims that if vulnerabilities were treated as product defects, companies would have an effective way of forcing developers and business units to focus on security issue. McFeters suggests providing bonuses for good developers, and taking away from bonuses for those that can't keep up. It's an interesting approach that if used, might force companies to take a stronger stance on security related issues."

There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence. -- Jeremy S. Anderson