Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:twofer (Score 1) 312

The way I see it, Political Corruption functions as either an enabler or a catalyst to bad behaviour in Military, Corporate, and Banking related issues. Releasing leaks on all of those topics would do far greater good than harm. I would argue further, that in cases where harm is attributed to the leak, the bad actors to whom the leak refers remain at fault for having created the potential for harm by their ill intent and bad actions.
Security

Submission + - Hacker attacks disable cars (bbc.co.uk) 1

katarn writes: In what probably isn't a great shock to us, main stream media realizes modern automobiles can be hacked in many ways. More of interest though, they were even able to disable the brakes (assumedly this was on a car with anti-lock breaks). Refreshingly, the article isn't fear mongering, and states "Cars benefit from the fact that they are (hopefully) not connected to the internet (yet) and currently are not able to be remotely accessed". One can only hope (perhaps in vain) that as cars become more connected they would be designed so that the electronics could not override the brakes. Of course once you have physical there are many ways an auto can be damaged or disabled even without being an electronics cracker. In my mind this type of attack could be much subtler and harder to detect; instead of physically cutting a brake line, the brakes could be programmed to only fail when needed the most, such as when anti-lock would normally be activated.
detect; instead of physically cutting a brake line, the brakes could be programmed to only fail when needed the most, such as when anti-lock would normally be activated.

Comment Re:How isn't this a form of terrorism? (Score 2, Interesting) 235

I'm glad you pointed out the definition of 'terrorism'. Those particular words were well thought out, I believe.

How much real fear in instilled in you, the Australian people, the Australian government, or the target site's admins as a result of this event? Any fear at all? Is this fear a reasonable response to this event? It's just computer systems and public websites, after all. Do you equate 'inconvenience' with 'danger'?

We're being conditioned to experience fear when we're told, on demand. We're told that an attack against a server is an attack on the people and therefore the expected response is fear, nee 'Terror'. As an individual, I ask you if you choose what you are afraid of? Do you hold in yourself the determination behind your actions, your beliefs, and your responses to external events? Do events out of your control cause you to fear them and their instigators because you believe that you are truly in danger, or because you have been conditioned to respond as if it were so by people who have a specific interest and benefit by your fearful response?

If you want to call these events 'Acts of Terrorism', if you want to be afraid, please do so on your own terms and not those handed to you along with the blindfold and handcuffs. You are a powerful individual, my friend, and you are capable of deciding for yourself what is right if you will only objectively view the events and effects that you experience. Keep that power to yourself, instead of simply handing it off to those who would manipulate you for their gain.

Image

Living In Tokyo's Capsule Hotels 269

afabbro writes "Capsule Hotel Shinjuku 510 once offered a night’s refuge to salarymen who had missed the last train home. Now with Japan enduring its worst recession since World War II, it is becoming an affordable option for people with nowhere else to go. The Hotel 510’s capsules are only 6 1/2 feet long by 5 feet wide. Guests must keep possessions, like shirts and shaving cream, in lockers outside of the capsules. Atsushi Nakanishi, jobless since Christmas says, 'It’s just a place to crawl into and sleep. You get used to it.'”

Comment Re:Well I guess its bad... (Score 1) 572

All of which she is capable?

That's just the problem. To you those women on stage are already dead. They've made money for displaying themselves and like a bitter used whore, are just a shell person filled only with the pain of their abuse?

What if they look at the wage slaves whose laps they sit in with the same pity we look at a fast-food worker, or MCSE? They get to dance for a bit and go home. The non-sex workers have to stay for hours and pretend to care about the topic.

The geeks whose careers are settling around them with the finality of cement versus the dancers whose lives are just beginning.

You'd have a point if these women were vat-grown clones who'd be terminated if they didn't perform. The truth though is that they're free to choose and the ones who would be crushed by being there aren't the ones rushing to fill the job.

Comment Re:Things don't work the way you think (Score 1) 212

What I have is mostly legal theory. Appropriation of an unpublished manuscript would be prosecuted under the Uniform Trade Secrets Act in most states. You can look that up. Publication and lawful sale provide you an implicit license to no longer consider that material as a secret. If you divulge the ending of Harry Potter 8 before it's published, expect to be sued, even though you bought the book and a copyright applies to it, and you never signed an NDA.

Comment Re:Sigh (Score 1) 572

Funny, seems the women who attended the event thought it was pretty funny to watch the awkward guys on stage not knowing what to do with the women in their face.

Did you get that part? No? Didn't read anything more than the summary eh?

There were female developers there ... having a good time ... The thing is that the just weren't American women, which are so sexually repressed and frustrated with themselves that they can't appreciate any situation which involves a women using her assets to their advantage if it involves physical attributes.

Whats fucked up is that American women are their own worst enemy.

Do you see guys bitching about male strippers? No, well okay, but only out of jealously.

Men are 'objectified' in the same way constantly. We appreciate it, enjoy the praise, and are more than happy that someone else appreciates what we have. Women in most of the rest of the world feel THE SAME WAY.

Its only in America where women get pissed off because another woman is using her abilities. In America, you are only accepted by other women if you shoehorn yourself into doing something you aren't really that good at.

Okay, so thats false, most women in America don't give a damn about this either. Its just the few loud mouths that get attention and the media promoting it that are a problem. I personally don't think I've ever met a woman who truly had a problem with strippers. I honestly don't think I've met a woman who hasn't considered BEING a stripper, including women who are now doctors, lawyers, and a VP of a rather large marketing firm in the US.

Its okay that you don't understand it, if you had some women as friends it would help you out a lot.

Comment Re:Meh. (Score 1) 993

Dear Roger(k@ndpta.com), we're feeling sorry for you that you gave up your credibility and any chance of adding value to the technology-interested community in exchange for money from Microsoft. We (technology professionals) know from much personal experience that the reason behind Mac system purchases is rarely based on "cool" in the business world. Instead, the reason is simply greater value through a much more stable operating system, hardware that is designed more robustly (longer MTBF), and considerably greater ease of technical support due to fewer OS related problems. Don't forget about Linux either. With the capability of running on a larger range of hardware than Microsoft products and the clear security advantages due to available source code you can evaluate yourself, Linux is beginning to threaten Microsoft as it's deployment in the workplace gains greater popularity. Even now, worldwide many governments, schools, and workplaces are realizing the benefits of a stable and open platform. My condolences go to you.
Intel

Clash of the Titans Over USB 3.0 Specification Process 269

Ian Lamont writes "Nvidia and other chip designers are accusing Intel of 'illegally restraining trade' in a dispute over the USB 3.0 specification. The dispute has prompted Nvidia, AMD, Via, and SiS to establish a rival standard for the USB 3.0 host controller. An Intel spokesman denies the company is making the USB specification, or that USB 3.0 'borrows technology heavily' from the PCI Special Interests group. He does, however, say that Intel won't release an unfinished Intel host controller spec until it's ready, as it would lead to incompatible hardware."
Graphics

Intel Shows Off Quake Wars, Ray Traced 368

An anonymous reader writes "At the Research@Intel Day 2008, Intel showed a ray-traced version of Enemy Territory: Quake Wars. Compared to the original game, a water with reflections and refractions and a physically correct glass shader were added. Also, a camera portal with up to 200 recursions to itself has been demonstrated. To show off this ongoing research in the topic of real-time ray tracing, a four-socket system with quad cores has been used that allowed rendering the enhanced visual effects in 1280x720 at 14-29 fps. Just two years before, early versions of Quake 4: Ray Traced ran only at 256x256 with 17 fps. Even though Intel's upcoming Larrabee will be primarily a rasterizer, the capabilities for also doing ray tracing on it should deliver interesting opportunities."
Communications

User Not Found, Email Drops Silently 292

shervinafshar writes with an International Herald Tribune story explaining just why it is failed emails don't always result in a helpful error message for the sender, which also gives some insight into ways that email can be used to spy on recipients. "In last lines of the article, two companies are introduced which provide services that can 'spy' on your email reading habits. They also can 'call home' too: 'Some entrepreneurs have seen that uncertainty and offered senders the ability to obtain receipts that a given message has been read — without the recipient knowing that a confirmation has been sent back to the sender. ReadNotify, based in Queensland, Australia, started in 2000 and promised to report not only on whether a message was read, but also on how long it was opened for reading on the recipient's PC. It can also send the message in "self-destructing" form, preventing forwarding, printing, copying and saving.' IHT also is asking its readers to comment about these kind of services being against user privacy."

Slashdot Top Deals

Genetics explains why you look like your father, and if you don't, why you should.

Working...