Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:No surprise (Score 1) 367

Most likely what you saw was the mobilesafari site. I have no good reason why it would appear to you in your normal browser except if it was a bug which occurred once while they introduced the new iphone version of their site. I recommend you try setting your browser string to

Mozilla/5.0 (iPhone; U; CPU like Mac OS X; en) AppleWebKit/420+ (KHTML, like Gecko) Version/3.0 Mobile/1A543a Safari/419.3

to get the results you described.

Comment Re:Yes, go for it. (Score 1) 918

I'm not the parent poster, but I agree with him.

I'm no precious snowflake. But I am better than a lot of other programmers, which is why they have been fired and I haven't. None of us are irreplaceable, but some of us are worth our money (and a whole lot more) and won't be fired. I make sure to treat my employer as a customer and supply him with high value products for the money he pays me every month.

I notice the world around me, and I feel for you that you are so desperate for a job - any job.

Comment Re:Yes, go for it. (Score 1) 918

To paraphrase what someone once told me, in four years (more or less), you're going to be 35 anyway. There's not a damn thing you can do about that, except die. if you don't go to school and get your bachelor's degree, then will it be any easier for you if you're an "old man" without a CS degree?

On the other hand: If you can get a job now, then in four years you'll have four years of actual work experience which is worth far more than four years of schooling.

I have had my share of fresh out of school co-workers, and wouldn't recommend anyone with less than 5 years of work experience to my employer ever. I say go and get the work experience if you can. It'll be worth far more in four years. And with four years of work experience no one will care about a diploma which is outdated the year after you get it anyway.

Comment Re:Usenet post? (Score 1) 261

However Linux has a more sane Version Number system

... or at least it did until they started to add new features for every increment of 2.6.x. In the old days of MAJOR.MINOR.BUGFIX you would increment MINOR when adding new features and increment MAJOR when abandoning compatibility with old versions.

Technology (Apple)

Submission + - One month on the app store - not rich yet (blogspot.com)

iamflimflam1 writes: One month ago I published an iPhone application. I wasn't expecting a huge number of sales — after all, who wants to buy yet another Sudoku application! I was slightly disappointed by the initial sales figures (Who doesn't dream of hitting the jackpot). It's been an interesting month though so I thought I'd share my sales statistics.

For anyone planning to make a living from iPhone apps — take a look at the first couple of weeks of sales and make note of the fact that the app is selling for only $0.99. For those of you who like to dream of making it to the big time — take a look at the last few days of sales on the UK app store and imagine what it would like if that was happening in 50 countries!

If you don't want to read the artical, then here's the executive summary, first couple of weeks 0-10 sales a day, last couple of days 300-350 sales a day.

The Internet

Submission + - Conficker to Create Dark Google? 1

The Narrative Fallacy writes: "John Markoff has a story on the NY Times speculating on what will happen on April 1 when the conficker worm is scheduled to activate. Already on an estimated 12 million machines, conjectures about Conficker's purpose ranges from the benign — an April Fool's Day prank — to far darker notions. Some say the program will be used in the "rent-a-computer-crook" business, something that has been tried previously by the computer underground. "The most intriguing clue about the purpose of Conficker lies in the intricate design of the peer-to-peer logic of the latest version of the program, which security researchers are still trying to completely decode," writes Markoff. According to a paper by researchers at SRI International, in the Conficker C version of the program, infected computers can act both as clients and servers and share files in both directions. With these capabilities, conficker's authors could be planning to create a scheme like Freenet, the peer-to-peer system that was intended to make Internet censorship of documents impossible. On a darker note, Stefan Savage, a computer scientist at the University of California at San Diego, has suggested the possibility of a "Dark Google." "What if Conficker is intended to give the computer underworld the ability to search for data on all the infected computers around the globe and then sell the answers," writes Markoff. "That would be a dragnet — and a genuine horror story.""
XBox (Games)

Submission + - Xbox Live accounts collected by Phishers (hdtvinfo.eu)

Xbm360 writes: "A collection of approximately 270 sets of login details that have apparently been phished via a fake XBox Live login page, appeared on Hacker sites.

http://xbox.hdtvinfo.eu/news-sections/4-xbox-live/13-xbox-live-accounts-collected-by-phishers.html

The list, 27 pages long in Word format, would allow people to access stolen XBox Live accounts, some of which may have credit card details stored against them.

This list seems to be in circulation on a number of hacking forums; the majority of the accounts were phished between November and December of last year."

Intel

Submission + - Intel threatens to revoke AMD's x86 license

theraindog writes: AMD's former manufacturing division opened for business last week as GlobalFoundries, but the spin-off may run afoul of AMD's 2001 cross-licensing agreement with Intel. Indeed, Intel has formally accused AMD of violating the agreement, and threatened to terminate the company's licenses in 60 days if a resolution is not found. Intel contends that GlobalFoundries is not a subsidiary of AMD, and thus is not covered by the licensing agreement. AMD has fired back, insisting that it has done nothing wrong, and that Intel's threat constitutes a violation of the deal. At stake is not only AMD's ability to build processors that use Intel's x86 technology, but also Intel's ability to use AMD's x86-64 tech in its CPUs.

Slashdot Top Deals

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...