Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - Report: Comcast In Talks To Buy DreamWorks For $3 Billion (usatoday.com)

An anonymous reader writes: Comcast is in talks to buy DreamWorks Animation in a multi-billion-dollar deal, The Wall Street Journal and Bloomberg are reporting. The cost of the deal would be more than $3 billion, according to both news organizations, citing unnamed sources. Jeffrey Katzenberg, CEO of DreamWorks Animation, has been searching for a buyer for the company, which has a current market value of $2.3 billion. DreamWorks is based in Glendale, Calif., and was founded in 1994 by Katzenberg, filmmaker Steven Spielberg and movie and music executive David Geffen. The animation unit was spun off in 2004. Philadelphia-based Comcast has two primary businesses, Comcast Cable and NBCUniversal. Comcast also owns Universal Parks and Resorts. Comcast already owns an animation studio, Illumination Entertainment, known for its work on the Despicable Me and Minions movies.

Comment Re:Your content is not worth it. (Score 1) 406

First: My search-fu is strong.
Second: Its actually quite the time saver as in, "meh, maybe I should get back to work."
Third: Chain of trust. When a site insists that you not continue without disabling your security, they insist that you trust them, and everyone they have decided to trust, and everyone they have decided to trust.

In the day and the age of the drive-by download, I've been burned. I've been tricked. I paid that price in time, and data loss. Websites I completely trusted had compromised advertising. It led to a hard rule. Always use protection.

My protection has a pretty large hole that ANY website could happily display all the ad content they wanted to me. Any content they directly host, (and therefore, take responsibility for) is allowed through. This gaping wound of security is covered by other software precautions in-case they get hacked... ('cause that never happens)

Comment validity? (Score 1) 177

Lets say that your proposal is implemented in the full glory that you think it should be, Lauren.

What happens when your crowd starts filtering out content based on what they don't like?
What if your "large scale designed to average out variations in cultural attitudes" turns into a stuffed ballet box for one ideology/political party?

More importantly, what happens when the messages go underground to websites that are not part of your anti-ISIS cabal?

Seems to me that the best we can do is make the report inappropriate/offensive content buttons bigger, as the alternative is a slippery slope leading to an anti-free speech version of the DMCA.

Comment Re:What I Don't Understand... (Score 1) 177

They are not way in the east. They have a global presence which is extended further every day. They may even live next door.
You are not safe just because your in the US. We can ignore them, and they will continue to fester... We can fight them, and give the message they spout more validity... What we cannot do is take definitive and final action because it is too horrible to contemplate. (read as nukes)

What we have not done is ask: What exactly caused them to come into being? What do they want?
The next question I have is: How do we keep them from ever getting it?
Bringing terror to peoples lives should be rewarded with the exact opposite of the demands, IMHO.

Comment Partial Immunity (Score 2) 143

I manually manage my phones data, both LTE and wifi. I turn it on only when needed, and turn it off when I am done. I only connect my wifi to AP's I know and trust. (all 2 of them) I do this mainly to extend battery life, but in part because I barely trust the few app's I have. It seems to me that my everyday usage provides a moderate amount of immunity to this particular "attack". I have no illusions about the security of my phone. I will never mobile bank on it. I do not check my primary email account on it. I backup my data (pictures) to my computer, not drop box or any other cloud storage. I assume that anything I upload to the cloud can and will be made public. I don't trust my carrier, my email providers, my ISP, or any cloud with anything more than what is absolutely needed to maintain the service. We've seen the breaches, the hacks, the outing of private information from individuals, major companies, and even governments. I'm in a position where I do not have to trust, so why open attack vectors if I don't have to?

Slashdot Top Deals

Keep the number of passes in a compiler to a minimum. -- D. Gries

Working...