Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Black Market Opportunity (Score 3, Insightful) 317

Human nature being what it is, this is an excellent opportunity for black market corruption -- drug company sells to developing country. Corrupt elements in developing country sell back to corrupt black marketeers who then resell in 'rich' countries to corrupt vendors for reduced prices and still make huge profits.
And still the people who need the drugs don't get them, but maybe some actually will, and that's a good thing.

Be

Submission + - BeOS Lives: Haiku Impresses (osnews.com)

kokito writes: "OSNews managing editor Thom Holwerda reviews Haiku, the open source successor of the Be operating system. According to the review, Haiku faithfully/successfully replicates the BeOS user experience and "personality", boasting very short boot times, the same recognizable but modernized GUI using antialiasing for fonts and all vector graphics as well as vector icons, a file system with support for metadata-based queries (OpenBFS) and support for the BeAPI, considered by some the cleanest programming API ever. The project has also recently released a native GCC 4.3.3 tool chain, clearing the way for bringing up-to-date ports of multi-platform apps such as Firefox and VLC, and making it easier to work on Haiku ports in general.

In spite of its pre-alpha status, Haiku seems to be pretty stable. If you would like to give it a try, nightly builds are available from the Haiku Files website, both as raw HDD and VMWare images. Or if you happen to be in the Los Angeles area, you could also take a peek at a Haiku demo during the upcoming Southern California Linux Expo (Feb. 21 & 22), where Haiku will be exhibiting in booth #4."

Comment Re:Yet another security risk (Score 1) 111

The scenario I saw play out is admittedly far-fetched but as a Slashdot reader, I've come upon shocking articles regarding our infrastructure here in the US being targeted by hackers from inside Russia and China. Here's one such example:

http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article2409865.ece

Now let's do a bit of extrapolation:
1. widespread adoption by NYC & LA -c class municipalities
2. traffic signal control governed by this 'network'
3. Understanding of the architecture gets into the hands of even more virulent enemies.

These three steps are not unlikely should this technology prove to be effective and become popular.

Now consider this scenario.

It's a day with fairly good weather near the Holiday shopping season. Commercial activity is at it's peak, along with tourism. A physical attack is then initiated along the lines of a medium sized chemical or biological weapon, or perhaps bombing of a central municipal structure such as Grand Central Station in NYC. Coordinated with this attack is a simultaneous assault on the traffic control network. This attack makes it impossible to
a. escape the scene
b. get first-responders to the scene

Result: complete chaos and panic.

Comment Yet another security risk (Score 1) 111

The increasing tendency to use this type of communication to support critical infrastructure is an open invitation to chaos and disaster induced by malicious hacking.

Consider for a moment all the past reports of external hacking on U.S. infrastructure and the chaos they created. Now imagine what would happen were this to be hacked after widespread adoption.

You all very well know that from the moment of its inception there will be concerted efforts to do just that.

No thanks.

Leave out the networking with private vehicles and it gets a bit better, but there's still a vulnerability.

Again, no thanks. It can't be made hacker-proof.

Slashdot Top Deals

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...