Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
The Military

Sarah Palin 'Target WikiLeaks Like Taliban' 1425

DMandPenfold writes "Sarah Palin, who is widely tipped as a possible Republican candidate for president in 2012, has said WikiLeaks founder Julian Assange should be hunted down in the way armed forces are targeting the Taliban and Al-Qaeda." So that means we should spend billions of dollars and not catch him? Good plan.
Transportation

The Sensible Body Scan Alternative 354

An anonymous reader sends in a CNN article that looks at airport security from more reasonable point of view, suggesting that looking for every last micro-gram of potentially explosive material is a waste of time, since very small quantities of explosives are unlikely to significantly damage a plane. The author also recommends incorporating parts of the Israeli method of securing airplanes — look for the bomber, not the tools. Quoting: "Clearly everything should be done to prevent explosives getting on board an aircraft in quantities sufficient to cause structural failure and bring the plane down. But is it worth chasing lesser quantities that would result in zero or minimal damage? The enhanced pat-down that some find so offensive is designed to search for these small amounts. It often ends with a swab being taken to test for explosive residues. Technology does have a role to play, but imaging is not the solution. Operator fatigue sets in after short periods of time staring at computer images. That's why there are reports that contraband items have been smuggled through X-ray units used to scan carry-on bags. The aim should be to detect high explosive in quantities that are sufficient to cause significant damage. We don't need a machine that takes pictures of the human body. It makes more sense to develop a detector that clearly discriminates between high explosives and human tissue or water."
The Media

In Defense of the Anonymous Commenter 198

Hugh Pickens writes "Doug Feaver has an interesting story in the Washington Post 'in defense of the anonymous, unmoderated, often appallingly inaccurate, sometimes profane, frequently off point and occasionally racist reader comments that washingtonpost.com allows to be published at the end of articles and blogs.' Feaver says that during his seven-year tenure as editor and executive editor of washingtonpost.com he kept un-moderated comments off the site, but now, four years after retiring, he says he has come to think that online comments are a terrific addition to the conversation, and that journalists need to take them seriously. 'The subjects that have generated the most vitriol during my tenure in this role are race and immigration,' writes Feaver. 'But I am heartened by the fact that such comments do not go unchallenged by readers. In fact, comment strings are often self-correcting and provide informative exchanges.' Feaver says that comments are also a pretty good political survey. 'The first day it became clear that a federal bailout of Wall Street was a real prospect, the comments on the main story were almost 100 percent negative. It was a great predictor of how folks feel, well out in front of the polls. We journalists need to pay attention to what our readers say, even if we don't like it. There are things to learn.'"
Role Playing (Games)

Tabula Rasa Going Out With A Bang 162

Mytob notes that sci-fi MMO Tabula Rasa is set to close down tomorrow, and the development team has something special planned for the game's final hours. The decision to close the game was made in November, and it went free-to-play a month later, while the developers continued to roll out the new content they had planned. Now, after a round of patches and server merges, the beleaguered MMO has reached its shutdown date. The game's primary enemies, the Bane, are launching an all-out offensive on Allied forces, which will culminate in a battle beginning at 8PM on Saturday and lasting until midnight. All players are being called in as reinforcements in this apocalyptic fight, though the final announcement says, "Penumbra has been informed of the situation and is standing by on the use of their last resort weapon. We can not afford to be complacent or uncertain, but if it is truly our destiny to be destroyed, we are taking them all with us."
Operating Systems

The Incredible Shrinking Operating System 345

snydeq writes "The center of gravity is shifting away from the traditional, massive operating systems of the past, as even the major OSes are slimming their footprint to make code bases easier to manage and secure, and to increase the variety of devices on which they can run, InfoWorld reports. Microsoft, for one, is cutting down the number of services that run at boot to ensure Windows 7 will run across a spectrum of hardware. Linux distros such as Ubuntu are stripping out functionality, including MySQL, CUPS, and LDAP, to cut footprints in half. And Apple appears headed for a slimmed-down OS X that will enable future iPhones or tablet devices to run the same OS as the Mac. Though these developments don't necessarily mean that the browser will supplant the OS, they do show that OS vendors realize they must adapt as virtualization, cloud computing, netbooks, and power concerns drive business users toward smaller, less costly, more efficient operating environments."
Data Storage

Why Not To Shout At Your Disk Array 125

Brendan Gregg of Sun's Fishworks lab has an interesting video demo up at YouTube demonstrating just how bad vibes, if expressed with sufficient volume in front of a rack full of disks, can cause a spike in disk latency. White noise, evidently, doesn't do them much harm. (Maybe they just feel awkward to get yelled at on camera.)
Social Networks

Study Recommends Online Gaming, Social Networking For Kids 189

Blue's News pointed out a report about a study sponsored by the MacArthur Foundation which found that online gaming and social networking are beneficial to children, teaching them basic technical skills and how to communicate in the Information Age. The study was conducted over a period of three years, with researchers interviewing hundreds of children and monitoring thousands of hours of online time. The full white paper (PDF) is also available. "For a minority of children, the casual use of social media served as a springboard to them gaining technological expertise — labeled in the study as 'geeking out,' the researchers said. By asking friends or getting help from people met through online groups, some children learned to adjust the software code underpinning some of the video games they played, edit videos and fix computer hardware. Given that the use of social media serves as inspiration to learning, schools should abandon their hostility and support children when they want to learn some skills more sophisticated than simply designing their Facebook page, the study said."
The Internet

China Defines Internet Addiction 201

narramissic writes "Three years after the first clinic dedicated to Internet addiction opened in Beijing, Chinese doctors have now officially defined it as an ailment. Those afflicted with this ailment spend six or more hours a day online and exhibit at least one of the following symptoms: difficulty sleeping or concentrating, yearning to be online, irritation, and mental or physical distress. Do you meet the criteria? You're in good company: About 10 percent of China's 253 million Internet users exhibit some form of addiction to the medium, and 70 percent of those people are young men, an official Xinhua News Agency report said."
Businesses

How To Deploy a Game Console In the Office? 310

SkydiverFL writes "Does anyone have an idea for a good solution for using a game console (Xbox 360, PS3, etc.) with a laptop and / or external monitor? I am planning to set up each of my developers at the office with a shiny new Xbox 360, surround headphones, and Gold memberships. The only catch is that I have to do it 'gracefully.' I would be grateful for any input on the technical setup and politics (how to get it in and how to work through the politics)." Read on for further details on the situation.
IT

Exchanging Pictures To Generate Passwords 123

Roland Piquepaille writes "Today, Ileana Buhan, a Romanian computer scientist, is presenting her PhD Thesis at the University of Twente in the Netherlands. She is using biometrics to protect confidential information when it is exchanged between two mobile devices. This is a very innovative approach to security. Buhan's biometric application will generate almost unbreakable passwords from photos taken by the connected users. Here is how it works. 'To do this, two users need to save their own photos on their PDAs. They then take photos of each other. The PDA compares the two photos and generates a security code for making a safe connection.'"

Slashdot Top Deals

Real Programmers don't write in PL/I. PL/I is for programmers who can't decide whether to write in COBOL or FORTRAN.

Working...