Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Value of a currency (Score 1) 168

One of the reasons a currency has value is that you can pay taxes with it. Essentially the threat of being jailed (or your possessions being taken away) by the state unless you pay them with their currency of choice provides one of the core pillars that make normal fiat currency actually have value. Since in most countries you cannot pay your taxes with crypto, it has little value as a true currency as eventually you have to convert it into a currency you can pay taxes with, or risk being thrown in jail etc. Thus crypto is eternally destined to be subject to the same price swing as any other commodity based on supply/demand, unless a lot of governments actually let you pay your taxes with it.

Comment Re:While it's bad, it's not surprising (Score 1) 22

Right, and scheduling them for a meeting AFAIK depends on the Free/Busy time permission set by default. Which users are perfectly able to change. See https://imgur.com/a/x8ycoJo for the default settings on the default calendar folder in a mailbox. This is easily changed in Outlook: https://technology.education.u... And yes, users usually don't want to change this. Because then they'd be inundated with meeting requests for times they are already busy. If I'm organizing a meeting involving several people and one of them is hiding their Free/Busy time for whatever reason, I'm just not going to take their schedule into account when I pick the time that best fits what availability I can see in everyone else's calendars.

Comment Re:While it's bad, it's not surprising (Score 2) 22

Maybe this changed at some point (I don't have any old Exchange servers online to check), but the ability for other users to view your free/busy timeline is an assignable permission on your Exchange calendar. It defaults to allowing any authenticated user to see your free/busy times (because of the obvious usefulness of knowing when people have unallocated time to get them into a meeting), but you're always able to change it to not allow any access at all (or even grant more permissions like allowing certain users/groups to see subject lines etc).
NASA

Voyager Set To Enter Interstellar Space 362

Phoghat writes "More than 30 years after they were launched, NASA's two Voyager probes have traveled to the edge of the solar system and are on the doorstep of interstellar space. Today, April 28, 2011, NASA held a live briefing to reflect on what the Voyager mission has accomplished — and to preview what lies ahead as the probes prepare to enter the realm of the Milky Way itself."
Cellphones

iPhone Users Angry Over AT&T Upgrade Policy 789

All is not sweetness and light in the wake of the Apple WWDC kickoff announcements, especially concerning the evolution of the iPhone. Reader Hugh Pickens writes: "AT&T will offer the new iPhone 3G S when it debuts later this month at a cost of $199 and $299 for the 16GB and 32GB models, but only to new customers and those who qualify for the discounted price. AT&T subscribers with an iPhone 3G who are not eligible for an upgrade — those not near the end of their two-year contracts — will have to pay $200 more — $399 for the 16GB model and $499 for the 32GB model. 'This is ridiculous and slap in the face to long-time loyal iPhone customers like me who switched from T-Mobile and the only reason was the iPhone,' writes one unhappy iPhone customer. 'We have to mount a vigorous campaign to change this policy. Call your local AT&T and ask for the manager and complain. Send e-mails and post in forums everywhere.' The issue is spurring heavy debate on support discussion forums, with some customers supporting AT&T. 'The option you have is to honor the contract you freely committed yourself to,' says one forum member. 'If you want to upgrade early then you will have to pay full price with no subsidy discount. You can't blame anyone but yourself for your predicament.'"
Privacy

Cone of Silence 2.0 91

Village Idiot sends word of a patent granted to MIT researchers for a cone of silence a la Maxwell Smart. This one doesn't use plastic, but rather active and networked sensors and speakers embedded in a (probably indoor) space such as an open-plan office. "In 'Get Smart,' secret agents wanting a private conversation would deploy the 'cone of silence,' a clear plastic contraption lowered over the agents' heads. It never worked — they couldn't hear each other, while eavesdroppers could pick up every word. Now a modern cone of silence that we are assured will work is being patented by engineers Joe Paradiso and Yasuhiro Ono of the Massachusetts Institute of Technology. ... Instead of plastic domes, they use a sensor network to work out where potential eavesdroppers are, and speakers to generate a subtle masking sound at just the right level. ... The array of speakers... aims a mix of white noise and randomized office hubbub at the eavesdroppers. The subtle, confusing sound makes the conversation unintelligible." One comment thread on the article wonders about the propriety of tracking people around an office in order to preserve privacy.
Communications

Toshiba Puts Fingerprint Readers on Cell Phones 163

An anonymous reader writes "As if it wasn't enough to have fingerprint scanners on laptops, Toshiba has put them on two of its latest smart phones. The Toshiba G500 and G900 feature fingerprint scanners on the back of the handsets, allowing users to access their phone by simply sliding their finger over the scanner. This is supposed to provide a better level of security than using a code of some sort. Of course it also means that someone is more likely to chop your hand off if they desperately want your data."

Earth Sandwich 158

yourhotneighbor writes "If you haven't seen Ze Frank's hilarious videoblog, it's worth checking out. A few weeks ago he challenged visitors to create an "Earth Sandwich" where two pieces of bread are placed exactly opposite each other on the globe. Google mashups showing what's on the opposite side of the Earth and a live GeoRSS-based bread gallery were provided. A piece on NPR this Saturday details the concept and a team from New Zealand and Spain completed the challenge. Then on Friday he allowed his show to be written by his viewers who battled out 2,000+ script revisions in a Wiki. Sunday's New York Times describes the results."

Sony Already Lost Media War to Apple? 325

Declan McCullagh writes "Sony's Walkman was the king of media players. Now Apple's iPod is, and Sony Connect was a flop. But Sony's problems may soon be even bigger: the company is having a remarkably difficult time coordinating software development across different divisions and continents, and some managers are worried that things may be getting worse. Will Apple's recent forays into the living room create even more of a problem for Sony?"

Comment Unlocking terminals (Score 2, Insightful) 310

Everyone seems to be forgetting the real big security issue with this.

Accessing physical data on the system's hdd (whether encrypted or not) is not the major issue - accessing currently running programs is.

Example - John Q Sysadmin has a few open ssh sessions to some of his favourite boxes - locks his workstation so he can wander off somewhere. Anyone exploiting this to unlock his workstation now has access to his logged-in ssh terminals.

Yes, there are other ways to achieve this, including keyloggers, trojans, etc, but this makes it stupidly easy to walk past a random workstation, and potentially 10 seconds later have root access on any number of other boxes the user happened to be logged in as.

Remember guys - better be shutting down your ssh terms before you go to lunch!

Slashdot Top Deals

When it is incorrect, it is, at least *authoritatively* incorrect. -- Hitchiker's Guide To The Galaxy

Working...