Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Follow the funding and experts (Score 1) 35

You have all the universities (UCB, Stanford, Caltech, UCLA) as well as a critical mass of tech companies that allows interchange of staff and the creation of a new company overnight. Getting a new job is as easy as going out for lunch. This applies to the East coast as well. Neither area is lumbered with a large unemployed population claiming benefits.

Having so many corporations means that a startup can remain in stealth mode and keep under the radar of politicians and quangocrats. I've known companies to implode because the local government office instructed that they were instructed "not to promote anyone any further but instead to have a fresh talent initiative".

Weather isn't that much of a factor. Even places close to the Arctic circle can have a strong tech base providing the quality of life is high.

Comment Re:Because (Score 2) 35

The tricky thing is that you need people with knowledge to do the R&D. If you are a startup based on academic research and located in a university area, then that is very easy. to do. The other obstacles are then affordable housing/rentals, short commutes, good schools for families as well as healthy meals for staff.

Comment Re:Quantum entanglement (Score 1) 162

What if we were to send out a photon beam from a source half-way between Sirius and Earth. We can entangle photons of different frequencies such as X-rays and visible light. If the X-ray photon is absorbed somewhere, the visible light photon disappears. But if there is no intercept, the visible light photon remains. That would seem to suggest you could send two photons in opposite directions. If one is absorbed, then the other disappears. And since the source is halfway between the two destinations, information is transferred twice as fast as it normally would take.

Comment Re:News flash (Score 1) 98

Any UNIX or Linux device that has a microphone, camera, or other sensor and TCP/IP support is going to be able to be tapped. Every device in /dev is a stream input or output device. That data can be read and then sent out to anywhere else in the world using the "sockets" library. That allows everything from VOIP to video-conferencing, instant messaging and group chat.

Comment Re:I thought women made better CEOs (Score 1) 40

That was the time Microsoft was in their "UNIX is legacy, Windows NT is the future" mood (mid 1990's). At this time Silicon Valley was dominated by the UNIX workstation companies. One by one they dropped their version of UNIX and adopted Windows NT as Microsoft kept throwing FUD everywhere. Even HP caved in. Commercial UNIX Applications developers were only interested in supporting a couple of platforms. When Windows NT comes along, the vendor with the least market share gets kicked off. Ultimately, it became a battle of Windows NT vs. Solaris and Linux. Enter the SCO vs. IBM (Linux) lawsuit which was the final battle, then Sun gets bought out by Oracle. Now, we're in the situation of Samsung (Android) vs. Appe (iOS) vs. Google

Comment Re: It's a shame (Score 1) 40

Don't forget the suicide of their chief scientist:

The goal genuinely was to build an all-in-one diagnostic system within a couple of years. But each and every competitors system has been built from decades of research. To look as if they had something working, they just used their competitors products to provide results.

Comment Re: If he gets busted... (Score 1) 86

I think it's ridiculous that wifi routers have only one password that can be bandied around. Even worse that the default passwords are listed on websites. I think every device that connects should have its own personal password. Does that give me the right to whack out wi-fi routers on these lists?

Has anyone seen the configuration menus for the firewall tables on these devices? Microsoft puts everything into one giant spreadsheet table; applications vs. user groups and accounts and types of service. Other companies block by port number and inbound/outbound or multicasts/broadcasts and IP bit masks.

Why can't /etc/hosts redirect or block using bitmasking as well?

Slashdot Top Deals

Surprise due today. Also the rent.