Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:And.... (Score 1) 681

It happens all the time. If you expect someone to sell your product, and your product has any amount of technological complexity above that of say a toaster, then you want that person to have some modicum of knowledge about the product. The retailer is not going to put any effort into training their employees so who is in the best position to make this happen? The manufacturer of course. Take your basic premise and replace MS and Best Buy with a manufacturer and retailer from any other industry and no one would think twice about it. I'm no MS fanboi and fully support Linux and all it stands for but really the bias is, as another poster stated, irrational.

Comment Re:Sign me up... (Score 1) 681

You obviously have never used Ubuntu. If you had you would know that Ubuntu includes OpenOffice as part of its standard install and features both the Synaptic Package Manager and the Add/Remove option for software, the latter having pretty pictures for those who need them. You're right that it's a check in the pro column for Ubuntu but it definitely hasn't allowed Linux to "beat" Microsoft.
Security

Submission + - Victorias not quite so Secret

Brian Fullar writes: "So I just got some account information from Victoria Secrets about fraud on my account, only to have them also send me someone else name, address and FULL Social security number. when asking about it they said it was a problem with their security system. They didn't even bat an eye at this breach of personal information

This is what causes peoples ID's to be stolen and in these troubled times you think they would have the decency to not pass this information around. So what should i do? open a class action lawsuit? Or just spread the word? They still deny my account is fraudulent and are telling me to write up my significant other as a prime suspect thus destroying any relationship prospects even though I don't believe it was her (i got papers from them with her signature that has the wrong style G's plus other anomalies she doesn't do in her handwriting)

When will companies take care of your personal information and stop sending it out without care?"
United States

Submission + - U.S. students behind in math, science (cnn.com)

tukang writes: American children aren't necessarily getting smarter or dumber, but that might not be good enough to compete globally, according to numbers cited Tuesday by Secretary of Education Arne Duncan. He noted a special analysis put out last week by the National Center for Education Statistics that compares 15-year-old U.S. students with students from other countries in the Organization for Economic Development. It found the U.S. students placed below average in math and science. In math, U.S. high schoolers were in the bottom quarter of the countries that participated, trailing countries including Finland, China and Estonia. According to the report, the U.S. math scores were not measurably different in 2006 from the previous scores in 2003. But while other countries have improved, the United States has remained stagnant.

http://www.cnn.com/2009/US/08/25/students.science.math/index.html

Networking

Submission + - Who Will Fix The Internet? No One, Apparently (csmonitor.com) 1

blackbearnh writes: "It seems like everyone focuses on the latest and greatest killer Internet applications, but the underlying infrastructure that all that shinny runs on is showing its age. That's the claim made by a recent article in the Christian Science Monitor. IPv4 is relatively ancient, and even stalled improvements like IPv6 are just fingers in the dike, according to some researchers. With no one "in charge" of the Internet, it's almost impossible to get any sweeping technical improvements made, especially since there's no financial incentive on the part of the ISPs and telecomms to invest in basic infrastructure. CalTech Professor John Doyle puts it this way. "To the extent I've been working in this field for the last 10 years, I've been mostly working on band-aids. I'm really trying to get out of that business and try to help the people, the few people, who are really trying to think more fundamentally about what needs to be done.""
Portables

Submission + - What should be in a course on Mobile Computing? 1

timothykimball writes: I am an iPhones application developer, and a friend who is a professor at a local university has asked me to teach this course to grad students. I want to look beyond the iPhone and look more broady at the problems of mobile computation — such as hardware constraints, new technologies, how software development is different. How user scenarios are different etc. What I am looking for are ideas or concepts that slashdotters would like to see in such a course. What should these grads learn?
Government

Submission + - Maricopa Cty. Sheriff takes over computer system (bizjournals.com)

Newer Guy writes: More then a dozen armed Maricopa, AZ Sheriff Deputies took over county computer rooms in its Wednesday raids and takeover of a computer system that interlinks police and court agencies. Sheriff Joe Arpaio's officers showed up Wednesday told computer technicians to step aside, posted armed officers at entrances and exits, and took over "management control" of the system. The Sreriff also changed the passwords for access to the computer system. This is the same Sheriff that has made tent cities for prisoners, and performs racial profiling in his county.
Privacy

Submission + - Burning Man responds to EFF's criticism of policy 1

Briden writes: Earlier this week, slashdot covered the EFF's criticism of the Burning Man Photo Policy. Burning Man has now responded on their own blog:

"In fact, there are but two essential reasons we maintain these increased controls on behalf of our community: to protect our participants so that images that violate their privacy are not displayed, and to prevent companies from using Burning Man to sell products."

"We don't remove images from pages just because they criticize us (I've never been involved in taking down an image from an editorial blog criticizing Burning Man, and it's certainly not because there haven't been any!). We're also not at all interested preventing participants from sharing their personal imagery or impressions of the event on third party sharing sites in a noncommercial manner, so long as they observe the concerns about privacy and commercialism. We're delighted to see people sharing videos, stories, and pictures on our official Facebook page, and we know that it, along with Flickr, YouTube, Vimeo, etc. are representative of the way many of us share personal imagery in the digital age."
Games

Submission + - Designer Fights for Second Life Rights

An anonymous reader writes: A 14-year London-based industrial designer has had his work ripped off in Second Life and is now looking to file a DMCA (Digital Millennium Copyright Act) grievance against his client. Commissioned to recreate the French Quarter in New Orleans, the designer, Gospel Voom, spent six months on the project, only to sign on to Second Life after its completion to find it was deleted by the client. She claimed it was taken down because it wasn't making money. However, despite having signed a contract that let Voom retain creative rights over his work, he later found out it was sold to another community, OpenLife, without his knowledge or permission.

Comment Re:In other words (Score 1) 342

Richard Hatch hated it too until they gave him a recurring role on the show. I wonder what Benedicts stance would have been if they had approached him for a guest role? I was a big fan of the re-imagined series so after the series was over, I thought I would revisit the original just for a lark. Maybe it was too soon and unfair to compare the two but jeez the original BSG was a real stinker. I made it through two episodes before I turned the whole thing off and returned the discs. I guess it's true that "you can't go home again"
Security

Local Privilege Escalation On All Linux Kernels 595

QuesarVII writes "Tavis Ormandy and Julien Tinnes have discovered a severe security flaw in all 2.4 and 2.6 kernels since 2001 on all architectures. 'Since it leads to the kernel executing code at NULL, the vulnerability is as trivial as it can get to exploit: an attacker can just put code in the first page that will get executed with kernel privileges.'"
PC Games (Games)

Submission + - Beta Testers: Getting Them. Keeping Them. (blogspot.com)

spidweb writes: "There is a huge chasm between the rough, quivering lump of code you just wrote and a solid product you can distribute to actual people. To make your game/mod/level/adventure publicly available without melting someone's computer, you will need good volunteer testers. Jeff Vogel, at his blog The Bottom Feeder, gives advice for finding testers, sorting the helpful from the crazy, instructing them, interacting with them, and rewarding them for their efforts.

The article can be found at

http://jeff-vogel.blogspot.com/2009/08/beta-testers-getting-them-keeping-them.html"

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...