Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Java

Submission + - Interview - James Gosling, father of Java

Minaloush writes: Interesting Q&A with Sun's James Gosling on silicon.com. The father of Java field questions on the GPL, security, the role of Java in the enterprise — and even reveals his — albeit limited — views on Windows Vista ("I tend to stay away from Microsoft [software] because it tends to be so toxic").

From the article:
If you come up with a good software development tool, that makes life easier for the developers and they can get their job done quicker, then the first thing the manager says is 'oh you've got free time on your hands. Do this extra thing'.
Wireless Networking

Wireless Routers for Congested Areas? 138

An anonymous reader asks: "I have been living close to campus at UW Madison for the past six months or so and have come across a problem. We, along with everyone else in the area, have a wireless router, both a Belkin 54g and a Linksys WRT54G. We have Charter 3 Mbit down/.25 Mbit up cable and 6 guys in our apartment. Just on our block about 15-20 people have routers. We are constantly plagued with problems connecting to the wireless, staying connected, getting connected after rebooting, hibernating, and so forth. We have to reset the cable modem and the router many times a day to get everything rolling again. I am thinking that the router is the problem, because my dad always told me that's why they have twenty dollar routers up to thirty thousand dollar routers. What router can I purchase that will help my situation and will work well in a congested college area?"
Unix

Define - /etc? 548

ogar572 asks: "There has been an ongoing and heated debate around the office concerning the definition of what /etc means on *nix operating systems. One side says "et cetera" per Wikipedia. Another side says it means 'extended tool chest' per this gnome mailing list entry or per this Norwegian article. Yet another side says neither, but he doesn't remember exactly what he heard in the past. All he remembers is that he was flamed when he called it 'et cetera', but that 'extended tool chest' didn't sound right either. So, what does it really mean?"
Communications

Boosting Cell Phone Signals in Strange Places? 40

hedgemage asks: "I work at a retirement home and we have trouble with the cell phones that our nursing and maintenance staff use. The problem is that our nursing home area is built into a lower level that was originally constructed as a fallout shelter in 1960. There's a lot of solid concrete in the walls and ceiling. We have paid out tens of thousands to try and get an on-site mobile to work using NEC Dterm PSII phones, but they have proven absolutely unreliable (not just in the bomb shelter but throughout the campus) and the only solution our telecom provider has is to install several thousand dollars more in transceivers. If we could use ordinary cell phones, it would be ideal for everyone. Is there an off-the-shelf solution that could boost regular cellular signals in our bomb shelter?"
The Courts

Submission + - I violated copyright law. Now what?

An anonymous reader writes: I am US-based and have recently been doing part-time subcontracting work for a friend in the UK who runs her own small marketing firm. She sells a complete branding/identity plan and if that includes a web site refresh, she calls me. The clients do not know who or where I am, or even that the work is being subbed. Like many designers, I often use Corbis and other photo merchants to mock up layouts for review. It is legal to download images ("comps") from Corbis to use offline for the this purpose. If the client likes the design/images, I get a quote from the photo vendor and the client has the option to purchase. If the price is too high, which it often is with Corbis, I turn to less expensive or free alternatives.

One of her clients, for whom I recently designed a site, just received a $25,000 invoice from a law firm in London representing Corbis, who claimed their content was on the client's site. The client of course was frantic when they received the bill and called my marketing friend, who called me. I investigated and sure enough, there were images on the site that were rightfully the property of Corbis, which I put there. In this instance I neglected to swap out the comps with legal images I purchased for the client from another online source before I made the site live. As a designer I respect content rights and did not, would not, maliciuosly steal images. The client and my friend had no idea.

I moved quickly to correct the situation — scrubbed the site and looked through other clients' sites to make sure nothing else had gotten through. I called Corbis and told their legal department what happened and they told me I would have to deal with the law firm, who handles "all our overseas affairs." I then sent a certified letter to the law firm telling them what happened in an attempt to exonerate the client, and by default, my friend. That was today.

I quoted the images in question on the Corbis site and the total would have been about $800. I did my due-googling and in the spectrum of copyright infringement, I want to believe I'm closer to the speeder than I am the serial-killer. Other photo houses (Getty) send out cease and desist letter and it's done. There is mention of similar situations on some forums, especially in the UK, but I can't seem to find any precedent as to what my fate might be. Does anyone have any idea? I made about $1,000 for the site about a year ago, and as much as it would pain me, would be willing to give that up to make this go away. But something tells me this is going to get ugly.
Security

Submission + - Webmail at Work

rtobyr writes: "I don't allow users at my organization to use any third party e-mail. When users complain, I point out that we can't control the security policies of outside systems. End users tend to think that big business will of course have good security; so I ran a test of the "Big Four:" Hotmail, Yahoo Mail, AOL/AIM Mail, and GMail. Yahoo Mail was the only webmail provider to allow delivery of a VBS script. GMail was the only provider to block a zipped VBS script. End users also tend to think that a big business would never pull security features out from under their customers. We Slashdotters know that AOL and Microsoft have both compromised the security of their customers. I don't know of any security related bad press for Yahoo or Google. Three of my Big Four either allow VBS attachments or have a poor security track records. So my Ask Slashdot question is this: If you are a network administrator, do you limit your users' ability to use third party e-mail, and if so, do you allow for GMail or other providers that you've deemed to have secure systems and repuations?"
Sci-Fi

Submission + - Star Trek To Return Christmas 2008

Tycoon Guy writes: "Paramount today announced the new 'Star Trek' film is scheduled for release on Christmas Day 2008. The studio also confirmed the film will be directed by J.J. Abrams, who said the film will "embrace and respect" Trek canon, but will also "chart its own course." Also today, rumors are out claiming Matt Damon, Adrien Brody and Gary Sinise will play Kirk, Spock and Scotty, respectively."

Slashdot Top Deals

"Most of us, when all is said and done, like what we like and make up reasons for it afterwards." -- Soren F. Petersen

Working...