Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Submission + - Travel Tips (

An anonymous reader writes: I am a world traveler, photographer and writer. My goal as a travel writer is to share with my readers the real travel experience, one way that I convey the real experience is through travel videos as well as my travel photography.

Submission + - Changing the Live for the Better through Operation Smile

An anonymous reader writes: Operation Smile Philippines, in cooperation with Kapampangan Development Foundation, and over 20 local volunteers and 8 volunteer plastic surgeons with Dr. Edwin Magallona, changed 82 children’s lives in a 3-day medical mission.

Comment Re:Typical government efficiency... (Score 1) 345

The entire problem here is the people writing the checks are ".gov". Government contractors are there to cash checks first, if there's time left over, they may give you something useful. (It usually falls to sub or sub-sub contractors to get to where any real work is done.)

The sad thing is, anyone in the payroll office could walk to their local Office Max, and there on the shelf (for mac or windows) find software that can do much more than the 60 year old COBOL system they've been using. For a few $$$ even. The real work comes from getting all the records from the old system into the new system.

(been there, project abandoned instead of handling the conflicts in merging systems)

Comment Re:Farts in their general direction. (Score 4, Insightful) 445

If its all encrypted its safe, but i agree it could be a bad day when they decide to ransom your data with higher prices down the road. It also sux when you are off-line and want a file.

I prefer not to have a monthly bill to access my stuff. ( sure, you could depreciate out your hard drives and come up with a "monthly equivalent", but still.. )

1. You're delusional. Encryption is NOT a magic spell that keeps anyone but you out. I don't care if it's 65536-bit, no. Cryptanalysis is at a level you could not possibly comprehend.

2. Booth was a coward that shot a great man in the back of the head while seated in a theatre. And like your sig says, I don't give a flying fornication what you think of that.

Submission + - Waveguide Electric Double Ridge Switch (

An anonymous reader writes: Waveguide Electric Double Ridge Switch -Antenna Factory: your source for high performance antennas, cable, tools, lightning arrestors, waveguides and custom RF applications, call us: 877-288-9112

Submission + - Way2Sms Info (

An anonymous reader writes: Information regarding Way2sms

Submission + - Forklift Rental Options (

liakat writes: When it comes to lifting and shifting machinery quickly, safely and efficiently around a site or factory, nothing compares to a forklift. Because they’re highly versatile and easy to use, it pays to have a forklift handy on your site. In this article, we look at the forklift hire options that we offer and explain the different uses for each model.

Submission + - Web Designing institute in delhi (

An anonymous reader writes: S.R. Animation & multimedia offer professional training in web designing,graphic designing,multimedia,animation, flash and basic computer by industry experts.

Submission + - SPAM: Don't Get 'Spoofed' by Rogue Callers

ino2george writes: Source: [spam URL stripped]

When caller ID first arrived on the scene it seemed like a godsend to many people: Now you could easily identify who was on the line and ignore unwanted calls, whether from telemarketers, an ex-boyfriend or an unfriendly collection agency.

But as often happens, unscrupulous individuals soon began manipulating the technology to defraud people by pretending to be someone else. Their scheme is called "caller ID spoofing" and disturbingly, it's perfectly legal in many cases.

Here's how caller ID spoofing works and what precautions you should take to avoid being victimized:

For a very low cost, businesses and individuals can use widely available caller ID spoofing software to generate calls which alter the telephone number and/or name that appear on the recipient's caller ID screen.

Police, private investigators and collection agencies have used legal spoofing services for many years. Others who might have a legitimate reason to hide their identity when making a call include domestic violence victims and doctors returning patient calls who don't wish to release their private telephone numbers.

Beyond that, the lines of legality begin to blur. The Truth in Caller ID Act of 2009 prohibits anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongfully obtain anything of value. Violators can be penalized up to $10,000 for each infraction. Unfortunately, such penalties haven't dissuaded many scammers.

One common caller ID scam involves spoofers pretending to represent a bank, government agency, insurer, credit card company or other organization with which you do business. They count on you being reassured after recognizing the company's name on your screen.

Related Articles: [spam URL stripped]

Under the pretext of warning about an urgent situation (breached account, late payment, pending insurance claim, missed jury duty summons, etc.), the spoofer will try to coax you into revealing personal or account information, supposedly to verify their records.

Often these are robocalls, where a recorded voice asks you to stay on the line to speak to a representative or call another number for more information. Do not. Probably thousands of other people are receiving the same message at the same time. If you suspect the call might possibly be genuine, contact the company yourself at the toll-free number found on your card, account statement or the company's website.

You should never reveal your full Social Security number, mother's maiden name, credit card number, passwords or other private information over the phone unless you initiated the call yourself. Someone possessing such information could use it to gain access to your existing accounts to withdraw or transfer money, raise credit limits or snoop around your recent activity, among other intrusions.

ID thieves also can use your personal information to open new credit accounts (e.g., credit cards, mortgage or car loan), create a new identity or even obtain a job fraudulently. Often, you won't even realize something's wrong until a collection agency — or the IRS — starts hounding you for unpaid bills or taxes.

Another common caller ID spoof involves hacking into someone's voice mail account. Many cellphone users never bother to set up passwords on their voice mailboxes (big mistake). And, since many voicemail systems grant access to callers phoning from their own number, a hacker could easily spoof your number and gain access to your messages. (You may recall this practice brought down the British tabloid News of the World in 2011.)

The increasing popularity of voice over Internet protocol (VoIP) phone services like Skype and Vonage also has increased caller ID spoofing activity. These services use computer addresses instead of actual phone numbers to connect via the Internet, so scammers can choose any available area code and phone number, making it even harder to determine who's who on your phone.

Join Discussion: [spam URL stripped]

Link to Original Source

Submission + - Triats of a Good Potomac Real Estate Agent (

An anonymous reader writes: Whether its about selling or purchasing a property, you will likely need an agent to deal with the property issue. This is because dealing with such business involve in a variety of sub-tasks.

Submission + - Egypt Update: Documents Reveal US Money Trail To Egypt (

Babawale24 writes: Berkeley, United States — President Barack Obama recently stated the United States was not taking sides as Egypt's crisis came to a head with the military overthrow of the democratically elected president.

But a review of dozens of US federal government documents shows Washington has quietly funded senior Egyptian opposition figures who called for toppling of the country's now-deposed president Mohamed Morsi.

Documents obtained by the Investigative Reporting Program at UC Berkeley show the US channeled funding through a State Department programme to promote democracy in the Middle East region. This programme vigorously supported activists and politicians who have fomented unrest in Egypt, after autocratic president Hosni Mubarak was ousted in a popular uprising in February 2011.
For details click the url

Comment Re:Farts in their general direction. (Score 2) 445

No it isn't. I can buy a 3TB hard drive that will last for at least the next five years for like $100. Dropbox charges $10/month for only 100GB of space, which works out to 1/30th the space at $600 for five years. With a hard drive, I always have access to my data, even if my internet connection goes out or I am in a location without a connection.

<cynicism>Hard drives are guaranteed to not fail for at least 5 years? News to me. Even ignoring premature failure, most warranties these days are 1-3 years.</cynicism>

On the other hand, assuming you've got local backups, I mostly agree with you.

Submission + - SPAM: Who Is Assata Shakur

An anonymous reader writes: Assata, was born and named JoAnne in New York City and spent many years of her life living in New York City or in segregated North Carolina with her grandparents. She was raised to be respectful of those who respected her and to always love herself.
Link to Original Source

Comment Re:I think... (Score 1) 304

I've done webdevelopment for years, there are things wrong with Javascript, there are things wrong with many languages. And if you stick to the subset people call 'the good parts' it's not bad.

Your argument about untyped code is a non-argument, it has never been an issue. It's a matter of programming style. With most styles of programming you'll never encounter a problem.

What it does do is create a performance ceiling, because untyped is hard to optimize for a VM.

But that is what asm.js is for now, for the performance critical code paths.

Submission + - SPAM: A8000 Smart Phone

kevinwang writes: Basic Information
Model A8000
Band GSM850/900/1800/1900MHZ
Sim Card Dual Sim Card Dual Standby
Service Provide Unlocked
Style Bar
Color White
Shell Material Plastic

CPU MTK6516 416MHZ
OS Android 2.2.1

Display Size 3.6" Resistive Touch Screen
Resolution 240*400 px
Screen Color 260K Colors

Support Format
Ringtones Type Polyphonic/MP3
Audio File Format MP3/WAV/AMR/AWB
Video File Format 3GP/MPEG4
Image File Format JPEG/BMP/GIF/PNG/GIF
E-book Format TXT/CHM/DOC/HTM
FM Radio Yes,please plug the earphone first
Earphone Port 3.5mm port
Card Extend Support TF card , up to 8GB extended

Link to Original Source

Feed Google News Sci Tech: Latitude and offline maps sacrificed at altar to Google+ - ZDNet (blog) (

Toronto Star

Latitude and offline maps sacrificed at altar to Google+
ZDNet (blog)
Summary: The search giant continues its streak of puzzling decisions as its location service and maps functionality fall victim this time. Chris Duckett. By Chris Duckett for Null Pointer | July 11, 2013 -- 04:31 GMT (21:31 PDT). Follow @dobes. Google overnight...
Google Seeking Android Developer Input in New SurveyseWeek
New version of Google Maps arrives for Android, on the way for
Google to 'retire' Latitude in favour of Google+ location sharingNDTV
Curbed (blog)-PCWorld
all 228 news articles

Submission + - SPAM: Assurance Hypothecaire

An anonymous reader writes: Mortgage Insurance : works by paying the outstanding principal amount of your mortgage if you die, a serious accident happens to you or you'll suddenly souffrire a terminal illness, you are covered up to a specified maximum amount.
Link to Original Source

Feed Google News Sci Tech: Only Alaskan Dog Breeds Are Purely American; DNA Analysis Revealed - Headlines & (

Headlines & Global News

Only Alaskan Dog Breeds Are Purely American; DNA Analysis Revealed
Headlines & Global News
A DNA analysis revealed that only the Alaskan Inuit sled dogs—Eskimo dog and Greenland dog—are purely Americans. The rest were from other countries. (Photo : Reuters). A DNA analysis revealed that only the Alaskan Inuit sled dogs—Eskimo dog and...
American Dog Breeds Hail From Pre-Columbian TimesNational Geographic
DNA traces the ancient roots of American dogs to (blog)
Dogs With American Roots RevealedDiscovery News
NPR-Huffington Post-Phys.Org
all 9 news articles

User Journal

Journal Journal: Pest control Louisville knows the best methods to use of removal!

Pests are harmful and destructive; you need to identify the pest that is destroying the house and other area. You will really not have an idea of where the pests are entering your house and you will also not notice the pest infestation that is taking place inside your house. You should right away think of pest control Louisville agency that will send employers or exterminators who will use the professional methods of driving away the pests out of the house. If you are a normal home owner, you

Feed Engadget: Your digital game library will be accessible from any PlayStation 4, says Sony (

The digital games you buy on your PlayStation 4 will apparently travel with you, virtually, when you move from console to console. Sony R&D senior team leader Neil Brown detailed as much at Develop today. "You can visit your friend's house you can log into your account and play any game from your digital library," he said. Paired with the console's "Play As You Download" functionality, Brown promised that users will be able to instantly jump into their full library of digital games from any PS4 after signing in with their PSN ID. "This makes a digital library a practical option in the real world," he added.

PlayStation 4 games are planned for digital launch alongside physical, thus making an all-digital game library a more possible goal. Should you purchase a physical copy, you can take the Blu-ray with you from console to console; the game will automatically install on the console's HDD, though you'll still need its disc in the tray for the game to play.

Filed under: Gaming, Software, HD, Sony


Source: Official PlayStation Magazine UK

Comment Re:Wow, did he ever call it: (Score 1) 1448

From 2004:

The fanatical Left will insist that anyone who upholds the fundamental meaning that marriage has always had, everywhere, until this generation, is a "homophobe" and therefore mentally ill.

Nailed it except for the part about marriage having some fundamental meaning, everywhere, until this generation. That is fiction unless it's about procreation, in which case it wasn't necessarily then and isn't now.

And the part about wanting equal rights is an aspect of "the fanatical Left", unless one is so far right that they can't see the centre anymore.

Comment Well, I can tell you're not an Android developer. (Score 3, Informative) 289

Fragmentation on Android is a huge problem. Each device manufacturer has their own slightly different version of the OS, each with its own set of issues and incompatibilities. Sure, they only crop up when you try to do specific things... like, say, open a Bluetooth socket.

(I am an Android developer responsible for testing my company's product on dozens of different tablets.)


An anonymous reader writes: Dengan produk Kaligrafi Ayat Kursi Foil dapatkan suasana ruangan rumah anda memiliki kesan yang nyaman dan berbau religi, Kaligrafi Ayat Kursi Foil dapat ditempatkan di ruang tamu maupun ruang keluarga. Kaligrafi Ayat Kursi Foil, akan menambah nilai seni tersendiri dan memiliki keunikan untuk di jadikan hiasan dinding rumah anda. Kaligrafi Ayat Kursi Foil yang satu ini harganya sangat terjangkau. Dalam pembuatan hiasan dinding Kaligrafi Ayat Kursi Foil ini dibutuhkan ketelitian dan kesabaran yang dilakukan oleh pengrajin kami yang sudah berpengalaman agar tidak terjadi kesalahan dalam pemahatan maupun mengukir bahan Kaligrafi Ayat Kursi Masjid Bludru, sehingga dapat dihasilkan Kaligrafi Ayat Kursi Foil yang halus, bagus dan indah.
-085646699700 – 3148DD41
Kaligrafi Ayat Kursi Foil sangat bagus sebagai hiasan dinding di kelas, kantor, kamar, ruang tamu, dan tempat berkumpul keluarga. Selain karena keunikan dan keindahannya, Kaligrafi Ayat Kursi Foil akan memberikan nuansa religi di dalam kelas, kantor, kamar, ruang tamu, dan tempat berkumpul keluarga. Di [spam URL stripped] kami khusus membuatnya untuk anda yang mengerti seni Kaligrafi Ayat Kursi Foil yang sangat cocok digunakan sebagai hiasan dinding sekaligus untuk menciptakan lingkungan kelas, kantor, kamar, ruang tamu, dan tempat berkumpul keluarga yang menyenangkan. Tertarik untuk segera memajang pajangan dinding Kaligrafi Ayat Kursi pinus fiber?? Segera kunjungi situs resmi kami di [spam URL stripped] dan hubungi agen resmi kami -085646699700 — 3148DD41.

Link to Original Source

Comment Re:Article itself is a waste of memory (Score 4, Insightful) 407

The market decided long ago that fewer programmer hours was better than users waiting a few seconds everyday for their device to GC.

No, actually, that's not what happened. As the summary and the story itself (both of which went unread apparently,) point out, one of the most successful systems to emerge in the market recently, iOS, is not a GC environment.

Over here you may learn about iOS memory management. Without getting too far into that wall of text one discovers the following:

If you plan on writing code for iOS, you must use explicit memory management (the subject of this guide).

Ok, so your claim that GC is the only viable solution for contemporary application development is demonstrably false. Lets look some other assertions:

programmers are inherently bad at memory management. Memory will leak [if programmers must manage it].

First, the vast number of iOS applications not leaking shows that a non-GC system doesn't necessary have to leak. At least not badly enough to compromise the viability of the platform, which is the only meaningful criteria I can think of when it comes to the market.

Second, why assume programmers are inherently bad at a thing when that thing has traditionally been exposed via terrible, error prone, demonstrably awful mechanisms? It seems to me that among widely used tools we leaped from 'systems' languages with truly heinous MM primitives (C/C++) directly into pervasive GC systems. Aside from Objective C+ARC there just aren't enough good non-GC systems to make broad generalizations. Thus, you may be right about programmers, but you can't prove it, and I doubt it.

Finally, what proof is there that pervasive GC is better at not leaking than a good explicit MM system? Anyone with an Android system and a bunch of apps will quickly discover that pervasive GC does not eliminate leaks.

[some phone] comes with a whopping 2GB of RAM

Goggle Glass has 682mb of RAM. There is always a new platform into which we much fit our software and the new platform is usually resource constrained, so there will never be a day when questioning the cost of GCs is wrong. Maybe the wearable you eventually put on will have 8 GB of RAM. The computers you swallow or implant or sprinkle around the lawn probably won't. The fact the next generation of phones can piss away RAM to greedy GCs just isn't particularly informative.

Submission + - Portland Acupuncture & Naturopath (

An anonymous reader writes: At Mountain Spring Health Clinic, we refine the techniques of both western and eastern medicinal traditions, integrating the best of both philosophies into our health care practice. We believe that effective medical treatment involves the careful application of both disciplines and treats the whole person, not just one symptom.

Comment Alternatives (Score 1) 445

There are a few alternatives that come to mind if you're like me and adhere to the philosophy that "data that doesn't exist on hard drives I can clone or shoot, either doesn't exist, or exists in the hands of my enemies"...

Where seamless sync isn't an issue, FTP/SFTP can work well. FreeNAS and NAS4Free do this with a great back end file system, but UnRAID, while not free, does do a pretty good job of performing a similar tasks if you have a hodgepodge of hard disks lying around. In all three cases, you're looking at a dedicated OS install.

OwnCloud is a good sync app and browser based file portal. The Android app for it is still very much in beta though and doesn't always sync everything you want it to.

Ajaxplorer is a great browser-based file manager, and they have a desktop sync client in beta. It's gotten a LOT prettier in this last release and has great user management tools, as well as a public folder system for collaborative efforts.

Both OwnCloud and Ajaxplorer run on a LAMP stack; the Turnkey Linux project and Bitnami both offer builds for both applications to make things relatively simple if you've got the hardware or a VM at your disposal.

Tonido will do desktop sync a la Dropbox with a point-and-grunt Windows installer; 2GB of sync is free, 100GB of sync is $29/year.

Looking for an inexpensive server to put it on? I had a great purchase experience from the guys over at ServerWorlds; it's possible to get a properly spec'd IBM x3550 from them for less than $500 using backplanes that will use off-the-shelf SATA drives in a RAID-1, and it'll fully support ESXi if you want. eBay is also a fountain of such things.

If home internet is too slow and/or untrustworthy to the point where you trust a colo provider instead, GoRack (the only colo center I could Google that gives actual pricing information) seems to be willing to power and shuffle data to your server for some $50/month or less. Clearly Dropbox has the edge here as far as availability and uptime as opposed to a single x3550 (along with the convenience of not having to manage your server), but if you load up the server with a pair of 2TB drives, the only offering Dropbox has that can compete with that is the business package that costs some $800/year.

Depending on your level of expertise, what you've got at your disposal, who you trust, and what you can spend, there are more than a few options besides dropbox.

Comment Re:LOL (Score 1) 161

In my opinion this is a good compromise between the two other options. It would expose vulnerabilities while keeping consequences for criminal hacking.

As I said: "white hat hackers" are one of the primary reasons we have security holes in the first place; their activities create the economic incentives for companies to release software with security holes in the first place.

This is your opinion. Again, you see the world as black or white which leads you to the prosecute everyone/prosecute no one extremes.There are actually three three options;

You just don't seem to grasp that, although "white hat hackers" helping fix security holes has a short term benefit, it is one of the primary reasons those security holes exist in the first place. Why should a company bother spend lots of money to make my software secure if it can just release it and pay a fraction of what I would pay for quality control to cheap "white hat hackers", and at the same time be shielded from public humiliation by law?

The only way to get companies to pay more attention to security is to raise the risk and the cost of releasing insecure software. Banning "black hat hacking" and allowing "white hat hacking" decreases risk and decreases costs of releasing insecure software, and that is exactly the wrong public policy.

I'm sorry if that argument is too subtle for your simplistic black-and-white world view.

Submission + - London Indian Film Festival 2013 dates (

An anonymous reader writes: Here you can find London Indian Film Festival 2013 Schedule, London Indian Film Festival 2013 dates. Here you can find the all new information about this festival.

Submission + - rolling gate repair NYC (

rollinggate2 writes: Rolling Gate NYC is the popular name in the field of door and gate installation and repair services in New York City over 10 years. We work 24 hours to provide reliable interior and exterior gate repair services to our clients.
User Journal

Journal Journal: san francisco sightseeing tours

Have you heard? Was that sleigh alarms jingling? Wait! I hear Christmas alarms ringing! Ienc the growing season, not only for shopping, however for relaxing onboard San Francisco's traditional holiday tours. Sing along during a motorized-hand made cable vehicle, slide onboard a snazzy, pre-nineteen thirties touring vehicle, or hop onto an english double decker evening bus tour.san francisco sightseeing tours.

Submission + - Microsoftstorepromocode (

promocode writes: We have actually supplied these solutions to our consumer to ensure that they could acquire our item quickly within their assortment and could make significant quantity of conserving.

Submission + - List of Best Shakira Songs – Top New Albums 2013 – Waka Waka Shakira (

An anonymous reader writes: Shakira Isabel Mebarak Ripoll, she is well known as Shakira, is a Colombian singer-dancer, songwriter, choreographer, record producer, and model. She was born on Feb 2, 1977, her age is around 36, she is 1.57 m tall and her nationality is Colombian. Shakira entered in the western market with her fifth album Laundry Service (2001) a great hit, which has sold over 20 million copies worldwide. — See more at:

Submission + - 3 Breakthrough Ayurvedic Cure For Male and Female Baldness! – Physicians R (

An anonymous reader writes: Baldness can be local or general. Here we will talk about causes and cure for baldness in male and female. Also we will know about what diets to eat and what lifestyle to follow to stop baldness.Normally, people are found with hairlessness on a circumscribed area of the skull or the beard. In worst cases, hair of the beard, eye lashes, eyebrows, armpits and even pubic region is lost.CAUSES OF BALDNESSGenerally, there are two main causes of baldness: Excessive mental worry, anxiety and anger. A type of pathogenic organism is also considered to be the cause of loss of hair from the body including head.

Comment Re:As someone who uses GNOME 3... (Score 1) 181

I agree. Apple's handling of their switch from GCC to LLVM is a good example where they kept both for a while is a good example of how distributions could have handled this better.

Some distributions btw didn't switch.For example Knoppix went from KDE 3 to LXDE. On the other hand distributions like Fedora, Arch, Mandriva forks or Gentoo did the right thing in following the "latest and greatest". Their users expect that. Ubuntu was really the tricky case and they sort of did their own thing with Unity.

As far as Wayland... that's going to be very dicey. Wayland has an X11 built in so there is no good reason not to switch to Wayland. The big issue is going to be going with Wayland only compiled applications. I suspect for the Linux world that's going to happen mainly on applications where performance matters. But Gnome given their focus on touch (where latency really really matters) are going to have to be among those. So it wouldn't shock me if Gnome 4 or Gnome 5 is Wayland only.

Submission + - How Do You Start a Blog Create a Blog (

billdad83390 writes: Once you install the software for the theme and layout that you will be using, you must choose your domain name. You should also choose tags at this time so that you can be searchable through the search engines that most people use. You will have to manage all of the user and reader accounts and try to migrate toward those that add substance to your blog. You want to accomplish ahving something that a reader should have enjoyed and that covers all of the topics and ideas that you have featured. You should have conversations that engage that reader and show in an SEO search or RSS feed on Facebook or on Tumblr.

A decade ago, one of the main decisions online businesses had to take was whether to start a blog or a website. This all changed with the advent of the SEO. Indeed, now it is not uncommon to see a website with its own blog and even a forum, says They use the static websites for the basic information like product prices, contact details, etc. The blogs on the other hand are great for handling all the other aspects including niche SEO, obtaining statistics in consumer demands through blog commenting, advertising new products or limited promotions. Thus, it is not that surprising for blogs and websites to now walk hand in hand online.

Submission + - Leading Manufacturer of Hydraulic Press Brake Machines. (

An anonymous reader writes: One of the leading manufacturer of Hydraulic Press Brakes & Mechanical Press Brake with huge experience in manufacturing with best price
and execlent quality press brake machines now in india.100% service back up.100% quality guiranteed.

Comment The problem isn't COBOL it is bad management (Score 1) 345

The problem isn't COBOL is is bad management. I think that really says it all. You have to manage a project and that means you have to have support at a high enough level that the impacted departments get their marching orders in agreement with the master plan. Otherwise you are doomed if you have to fit the solution to the middle management tier's "requirements" because their "requirements" are that everything stays the same so their jobs and departments are unaffected by the new solution. That's not going to happen in a ground up re-implementation.

Comment Re:Worth the tradeoff.. (Score 1) 566

You shouldn't have several concurrent TCP connections to the same host. Most browsers won't open more than two.

Fast Open is an experimental draft with security flaws and packet duplication problems.
Fast Start hasn't taken off since it was demonstrated 15 years ago.
CRIME also applied to plain old HTTPS. That's been fixed. HTTP 2.0 has different header compression than SPDY that is explicitly designed to counter this attack.

Submission + - SPAM: Resources Technology Also Has Changed The Way Businesses Strategize About Resour

adawas67 writes: Since the top ten social media sites may not be the best way of reaching workers to burn sensitive business data to removable media and take it out of the office. Many businesses use the Microsoft Office suite, for example, and as noted by the CIO news website, when a friend, or invite all of your followers to a special sale. If your customers commonly perform the same actions to rent PCs and software, wordprocessing and spreadsheets as well as programs that operate by inputing, processing and outputting data. Many businesses have implemented technology designed for personal use to reduce process, particularly for a project such as new product development.
Link to Original Source

Comment Re:Cobol is self-documenting (Score 2) 345

I will say that I was pleased to discover that my old software (my very first program, written with one of my NCO's - and it's not clear from the comment, but that wasn't anywhere close to my just happened for convenience) was still being used more than 10 years after the fact, although I do admit that I was a bit dismayed as retrospect it wasn't all that impressive :p

Slashdot Top Deals