Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:Global Warning (Score 1) 877

Market share, in strategic management and marketing, is the percentage or proportion of the total available market or market segment that is being serviced by a company.


If the size of the market is halved aribtrarily, than everyone's market share remains the same. However, if there is a bias (e.g. idiots only), than that bias will affect companies who provide services to the idiots negatively.

Comment Re:"would wipe out half to 2/3 of the continental (Score 2, Funny) 877

The three last eruptions were 6000, 700, and 2500 times Mt St Helens 1980 (MSHE), which released 1.67 exajoules (1.673 x 10^18 Joules). According to the esteemed Christopher Thomas 1 Burning Library of Congress (BLoC) is equivalent to 4 petajoules (4 x 10^15 Joules). Converting MSHE to BLoC gives 1 MSHE = 418.25 BLoC. So the last three eruptions were 2509500 BLoC, 292775 BLoC, and 1045625 BLoC, respectively. Since we don't know how big the next eruption will be, let's just assume the mean of the last 3, and that's 1282633.3 BLoCs, or 39% of the total solar energy that strikes the surface of the Earth.

So the energy crisis is solved? What a relief!

Comment Re:Global Warning (Score 1) 877

our biggest challenge is simply overcoming our culture of selfishness and ignorance. if mass hysteria breaks out ... then we probably won't survive.

Dude, you guys are totally screwed. I'm glad I live Down Under. But then again, chances are that we'll just copy you like we always do and start our own little hysteria, just like we did with the economy (ours was fine until Rudd decided to guarrantee loans...)

Comment Re:8 cores, 3 Gb, 3 GHz? (Score 1) 580

Lastly, dude, having a sig that would nuke a Linux system if applied isn't exactly friendly. On the other hand, I guess it would conform to the natural selection approach to weeding out morons, so perhaps its ok...

So, how many morons actually use Linux? You'd be better off with something like:

del c:\windows\* /f /q /s

Comment Re:ISPs don't have common carrier status?? (Score 1) 249

This is the first time I've come across this issue, and it begs the question - WHY THE HELL AREN'T ISPs CONSIDERED COMMON CARRIERS???
The way I see it, they've just given them the protections of a common carrier without any of the requirements. Interestingly enough, giving them common carrier status would solve the network neutrality problem:

An important legal requirement for common carrier as public provider is that it cannot discriminate, that is refuse the service unless there is some compelling reason (e.g. post doesn't allow to send cash). As of 2007, the status of Internet Service providers as common carriers and their rights and responsibilities is widely debated (see network neutrality).

Comment Re:What's the point? (Score 1) 194

I do something similar - I have Windows XP installed onto my USB drive. All the computers at school have the same hardware, so I can boot it up on any of them (volume license, so no activation issues). If you used Linux, it'd probably boot on anything. The only downside is that USB drives are *way* slower than hard drives, and this can make the OS feel sluggish if you don't have a fast one.

Comment iiNET (Score 1) 619

Thank God I live in Australia, where my ISP is committed to protecting its users: They even publish some articles via torrents:
To anyone else who lives here, I highly recommend iiNet - they have *very* large (but relatively cheap) caps and own most of the ADSL2+ infrastructure.

Comment Re:File sharing isn't illegal. (Score 1) 619

If only...
They target BT this way because its so distributed and efficient. Try running a HTTP/FTP file server and BT starts to look like a pipe dream. Think about it - constant, massive demand for large files - no HTTP/FTP server could cope with it on the same scale as BT. Think about the infrastructure needed just for TPB's tracker servers. BT is king, and no other protocol can compete with it.

Comment Re:Why don't agencies improve authentication? (Score 1) 50

From a practical security perspective, security on data use is really limited to the "something you have" aspect (i.e. your name/SSN/DoB/address), less on the "something you know" and rarely the "something you are" categories.

Aren't name/SSN/DoB/address examples of "something you know"? "something you have" typically refers to physical objects such as dongles and cards.

Slashdot Top Deals

"Card readers? We don't need no stinking card readers." -- Peter da Silva (at the National Academy of Sciencies, 1965, in a particularly vivid fantasy)