Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Oracle

Oracle Sues Companies It Says Provide Solaris OS Support In Illegal Manner 154

alphadogg writes "Oracle is continuing to crack down on companies it claims are providing support services for its products in an illegal fashion. Last week, Oracle sued IT services providers Terix and Maintech, alleging they have 'engaged in a deliberate scheme to misappropriate and distribute copyrighted, proprietary Oracle software code' in the course of providing support for customers using Oracle's Solaris OS. Oracle's allegations are similar to ones it has made in lawsuits against other Solaris service providers, such as ServiceKey, as well as Rimini Street, which provides third-party support for Oracle and SAP applications."

Comment Re:Wait, what? (Score 1) 133

It's not carpooling. These are cars and drivers that would not be on the road without the service.

It may not purely increase congestion - the riders might otherwise use a car of their own. But it's basically a taxi with 10x better service (in function, not just attitude), slightly lower prices, and total dependence on GIS for knowledge of local geography.

There are a variety of reasons to regulate taxis, but the original one was that otherwise, taxi drivers would run a ton of scams. This isn't a problem with Lyft, specifically. Now we have additional concerns about traffic congestion and ecological impact. I don't know whether that is a problem with Lyft, but it's not crazy to suggest regulation.

Comment Re:Disappointing for a new connector (Score 2) 392

With its limited pin count, it's not a surprise that the Lightning connector does not have the bandwidth to transfer uncompressed video.

I totally disagree. Coax and Ethernet get you plenty of bandwidth on fewer pins. When Apple announced this thing, I was delighted that they must have some kind of brilliant plan for using these very few pins in a flexible, high quality, eventually low-cost manner. If their plan for flexibility was just "send a system image over USB, then connect via USB to that thing once it boots" then I am surprised and disappointed.

Costs may come down as we approach computing ubiquity, but this puts a ceiling on quality and that seems like a poor plan. We might want our iPads to drive 4K displays. Probably not next year, but in 8 years, sure.

I'm sure there are real, physical limitations that I don't understand that make this required, but I'm still disappointed.

Comment Log confirms one of the NYT complaints (Score 1) 841

Although this evidence does seem to show that the NYT reporter is a liar, one of the most alarming issues was the overnight loss of charge. Broder claimed that his car went from 90 miles range to 25 miles range overnight for no reason.

When I parked the car, its computer said I had 90 miles of range, twice the 46 miles back to Milford. It was a different story at 8:30 the next morning. The thermometer read 10 degrees and the display showed 25 miles of remaining range — the electrical equivalent of someone having siphoned off more than two-thirds of the fuel that was in the tank when I parked.

You can see what looks like exactly this issue in the charts between Milford and Norwich.

News

Pepsi To Release New Breakfast Mountain Dew 362

skade88 writes "Pepsi will release on Feb 28th a new breakfast Mountain Dew. The new drink called Kick Start is Mountain Dew mixed with fruit juice. It will come in two flavors, Citrus and Fruit Punch. 'Our consumers told us they are looking for an alternative to traditional morning beverages – one that tastes great, includes real fruit juice and has just the right amount of kick to help them start their days,' said Greg Lyons, Mountain Dew's vice president of marketing."
Games

Why Microsoft Got Into the Console Business 257

An anonymous reader writes "Joachim Kempin, former vice president of Windows Sales, has explained how the original Xbox came to be. It turns out it was Sony's fault, simply because the Japanese company wasn't very friendly towards Microsoft, and Microsoft eventually decided they had to 'stop Sony.' Apparently, long before the Xbox was even an idea, Microsoft was trying to collaborate with Sony in a number of areas they thought there was overlap. That collaboration was sought before even Sony had a games console coming to market, and would have focused on products for the entertainment sector."

Comment Re:A more detailed proposal ... (Score 1) 336

Sure, I know and like DNSBLs including Spamhaus's, but this is a distinct application from XBL. Specifically, removal needs to be rapid in order for it to be useful for rejecting customer Web traffic. That's an engineering requirement that email anti-spam systems don't have, since SMTP is designed to retry for days if necessary to get a message through. Moreover, hosts that send any legitimate email are very few compared to hosts that send Web requests; and even though email admins are frequently dense, unresponsive, or victim-blaming, they're still a level above typical users in knowing what the fuck is going on with their computer.

One approach would be to have each DDoS victim continually (e.g. every hour) assert which addresses were attacking it, and only list those addresses which are currently attacking. This way, as soon as a host stops attacking, it will drop off the list. This has weaknesses — for instance, an attacker can use your host all night while you're not using it, without you noticing — but it's still an improvement over what we have today. And it still depends on each subscribing site having a good enough backchannel to the listing service to stay open during the DDoS. Back in the day we'd do it with a dedicated modem line — the bandwidth requirements are really quite minimal — but nobody knows what that is any more.

Comment A more detailed proposal ... (Score 5, Interesting) 336

Sites under DoS attack should publish (through a channel not congested by the attack) a list of the IP addresses attacking them, through some trustworthy third party. Then, other sites should subscribe to that list and refuse service to those addresses until they clean up and stop attacking.

For instance, consider your uncle who uses AOL. His computer is infected with botnet garbage and is participating in a DoS attack against (say) Slashdot. Slashdot sends a list of attacking IPs, including your uncle's, to Team Cymru (the third party). Cymru aggregates these and publishes a list, updated every three hours. AOL subscribes to that list. When your uncle goes to check his AOL email, he gets an error: "We regret to inform you, your computer has been hacked, and is being used by criminals to break the Internet. You can't get to your AOL email until you kick the criminals off by installing an antivirus program and running a full scan. Click here to install Kaspersky Antivirus for free. Thank you for helping keep criminals from breaking everyone's Internet. Sincerely, Tim Armstrong, CEO, AOL."

Then your uncle gets mad and calls up AOL and complains. They try walking him through using the antivirus program, but he just curses them out and says he'll go to Hotmail instead. He tries ... but Hotmail also subscribes to the same list and tells him the same thing: "Your computer is infected with malware and is being used to attack other sites on the Internet. You cannot obtain a Hotmail account until your computer is clean. Click here to install Microsoft Antivirus." He gives up and calls AOL back, and they help him get his computer cleaned up. Within half an hour, it's off the botnet; and within three hours, it's off the list of attacking hosts, and your uncle can get his AOL email again.

Piracy

App Auto-Tweets False Piracy Accusations 231

An anonymous reader writes "Certain iPhone and iPad applications from a Japanese company have broken software piracy detection mechanisms that are sending out tweets on the user's own Twitter account, saying, 'How about we all stop using pirated iOS apps? I promise to stop. I really will. #softwarepirateconfession.' The trouble is, it's sending these out on accounts of users who actually paid up to $50 or more for the software and who are legally using it. The app is asking for access to users' Twitter accounts, but does not give the reason why it is asking, so the author of the article concluded (rightly) that things were being done deliberately. Would you want your legally purchased software to send out messages to all of your contacts on Twitter or on other social networks saying that you were a software pirate? Would you excuse the writers of the software if it was just an error in their piracy detection measures?"

Slashdot Top Deals

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...