Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Intel Challenges Manufacturers to Avoid "Conflict Metals" (nationalgeographic.com)

retroworks writes: Several news outlets, CBS, Verge, Engadget, National Geographic, MarketWatch, etc. report on Intel's announcement that the chips it produces will avoid purchases of rare earth minerals and metals, such as tantalum, sourced from high conflict areas such as Congo basin. Will recycled content follow? Will manufacturers begin stating the percentage of their boards which are made from recycled boards, like recycled paper greeting cards, closing the loop on the environmental conflict-mine-to-ewaste chain? Or is another De Caprio "Blood Diamonds" film in our future?

http://www.engadget.com/2014/01/06/all-intel-microprocessors-conflict-mineral-free/

Comment Re:And I Will Stop Buying... (Score 1) 521

I'm just hoping they don't do this with 3/4 and 1 ton pickups and SUVs. I agree with you, I need a pickup to work and haul. Sure, Al can be used in some places to lighten load, but when you start looking at the frame, you are weakening the overall strength...Got, imagine grade 8 bolts made out of Al.

Submission + - Stolen Adobe Passwords Were Encrypted, Not Hashed

rjmarvin writes: The hits keep coming in the massive Adobe breach. It turns out the millions of passwords stolen in the hack reported last month that compromised over 38 million users and source code of many Adobe products http://sdt.bz/65281 were protected using outdated encryption security http://sdt.bz/65320 instead of the best practice of hashing. Adobe admitted the hack targeted a backup system that had not been updated, leaving the hacked passwords more vulnerable to brute-force cracking.

Comment Bounty Source (Score 3, Informative) 109

How does this differ from Bounty Source? Bounty Source has been around for awhile now, is well maintained and already offers everything here. In some things, to much diversity is a bad thing and I see that here. You need to be able to meet up as many users with developers as possible for a system like this to work well.
The Military

United States Begins Flying Stealth Bombers Over South Korea 567

skade88 writes "The New York Times is reporting that the United States has started flying B-2 stealth bomber runs over South Korea as a show of force to North Korea. The bombers flew 6,500 miles to bomb a South Korean island with mock explosives. Earlier this month the U.S. Military ran mock B-52 bombing runs over the same South Korean island. The U.S. military says it shows that it can execute precision bombing runs at will with little notice needed. The U.S. also reaffirmed their commitment to protecting its allies in the region. The North Koreans have been making threats to turn South Korea into a sea of fire. North Korea has also made threats claiming they will nuke the United States' mainland."

Comment Re:I think that's all college students (Score 0) 823

I have forgotten more than you will ever learn! This will hold true unless you realize you know shit and seek to expound instead of hold what little you know over those who know less which becomes a slowly shrinking number unless you constantly phase out those who make you look like a dip shit in search of new people to troll.

Comment Re:Display information (Score 1) 146

Hacking doesn't HAVE to involve breaking open or doing something outside of the devices current limitations. A HACKER is someone who can also make new use of a device by further understanding its uses within its current limitations and adapt it to his/her need. Hacking is about understanding why things work and how you can make them work better for you also...

Slashdot Top Deals

BLISS is ignorance.

Working...