Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
IBM

Submission + - 'Jeopardy!' pits man against computer in Round 1 (denverpost.com)

PolygamousRanchKid writes: In the "Jeopardy!" battle of man vs. machine, man and machine were neck-and-neck on Monday.

Human player Brad Rutter and the supercomputer named Watson ended an initial round tied at $5,000. The other challenger, human Ken Jennings, was far behind with $2,000. Rutter (the show's all-time money-winner with $3.25 million) and Jennings (who has the longest winning streak at 74 games) are the most successful players in "Jeopardy!" history. Watson, named for IBM founder Thomas J. Watson, is powered by 10 racks of computer servers running the Linux operating system. Read more: 'Jeopardy!' pits man against computer in

Round 1 — The Denver Post http://www.denverpost.com/technology/ci_17391282#ixzz1E14JyiC8 Read The Denver Post's Terms of Use of its content: http://www.denverpost.com/termsofuse

News

Submission + - The true cost of publishing on the Amazon Kindle (pcpro.co.uk)

Barence writes: Ever wondered why Kindle newspapers and magazines don't have many photos? PC Pro has done an analysis of the costs of publishing on The Kindle and discovered that Amazon effectively taxes newspapers and magazines for including more images. Amazon applies "delivery charges" to publishers at the cost of $0.15 per MB/10p per MB. At those prices, PC Pro claims it's cheaper to mail out a physical magazine than have it delivered electronically on The Kindle. What's more, publishers have no control over the price of their newspaper or magazine: Amazon sets the prices itself, leading to huge customer complaints for titles such as The Economist.

Comment Re:Why did they even need passwords? (Score 1) 236

What I'm left wondering is why someone should need a username and password to comment on a blog post on their sites. Do they have a reputation system? Does it really prevent spam? Or is it just to gather a list of email addresses that they might sell later? There must be a better way to accomplish the little functionality that their login requirement provides. Especially now that they have to deal with the fact that their login system was not secure.

There are two primary reasons to require logins:
1) A registration system with a captcha is highly-effective at preventing spam on your blog comments or forum posts.
2) To a greater or lesser degree, it prevents people from impersonating you. Sure there are ways to trick this (create a username that's one lookalike character off, etc.) but on the whole it makes it easier to recognize who you're talking to.

Education

Gulf Oil Spill Disaster — Spawn of the Living Dead 228

grrlscientist writes "A recently published study, intended to provide data to commercial fisheries in the Gulf of Mexico so they maximize their catch of Yellowfin Tuna, Thunnus albacares, whilst avoiding bycatch of critically endangered Atlantic (Northern) Bluefin Tuna, Thunnus thynnus, suggests that the Deepwater Horizon oil leak may devastate the endangered Atlantic bluefin population, causing it to completely collapse or possibly go extinct."
Media

Submission + - Woman fined $1.9M for downloading 24 songs (cnn.com)

Karrde712 writes: A Federal jury found a Minnesota woman guilty of copyright violations put forth by the RIAA. The jury awarded a fine of $80,000 for each of 24 songs that she downloaded. The woman and her lawyers were shocked at the size of the fine and plan to appeal.

Comment Action Quake 2 (Score 1) 739

My first experience with Linux was Red Hat 6.2. I installed it on some leftover hardware I had lying around after an upgrade and followed a HOWTO I found on the web to install an Action Quake 2 server. It ran for six months without a reboot until I had to take it home for the summer.

Comment Re:is the safest, most reliable OS we've ever buil (Score 1) 1010

I'd like to set the record straight on your comments about the "other high profile distro" that "let attackers actually sign some rogue packages with their private key". This is verifiably false on all points.

The full description of how this attack took place is available here: https://www.redhat.com/archives/fedora-announce-list/2009-March/msg00010.html

No software vulnerability was exploited. It was a classic case of social engineering. A hacker was able to gain access to an ssh key providing access to the build infrastructure and uploaded a set of modified packages. They were designed to snoop for the passwords necessary to use the signing server. The intrusion was detected and repaired before any infected packages were signed.

Please do at least a trivial amount of homework before throwing about accusations.

The failing of the first distribution was in their insistence upon forking a private copy of the crypto libraries that the community at large refused to even look at, which is why the error went undiscovered for so long. This was a failure of the developers to follow the core tenets of collaborative development, and should serve to prove the effectiveness of community development rather than imply that open-source is somehow less secure.

Microsoft

Submission + - Microsoft downplays Vista speech vulnerability

john-da-luthrun writes: Microsoft has attempted to downplay reports that Vista's speech recognition capabilities could be hijacked by malicious websites in order to irretrievably delete user data. An MP3 file could be used to instruct the PC to delete a file and empty the trash. Microsoft's line is that there is "little if any need to worry" about this, as it would only work if the speech recognition feature is activated and the microphone and speakers are switched on. So if you're using speech recognition without a microphone or speakers, then presumably you're safe...
Windows

Submission + - Vista Family Discount Keys Found Not Compatible

acousticiris writes: Many (if not all) users who took advantage of Microsoft's Vista Family Discount have been issued invalid installation keys and cannot install Windows Vista Home Premium. Microsoft says, "There is no expected time period for a fix at this time." According to the article, the keys are valid for something, just not Windows Vista. Perhaps it's just too simple to issue these folks new keys and send them on their way.
Announcements

Submission + - Search for Jim Gray called off

Karrde712 writes: From the article: "The Coast Guard planned to call off its search early Thursday for an acclaimed computer scientist whose sailboat has disappeared off Northern California. Despite unusually calm weather, searchers have exhausted any area Jim Gray could have drifted or sailed after leaving for a solo sailing trip Sunday to scatter his mother's ashes at sea, a Coast Guard spokesman said."

Slashdot Top Deals

To the systems programmer, users and applications serve only to provide a test load.

Working...