Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Yale course "Game Theory" on Youtube (Score 2) 152

Here is the complete Youtube playlist for the Yale course "Game Theory", lectured by Ben Polak. 24 lectures in total, about 1 h 15 min each.

Course description: This course is an introduction to game theory and strategic thinking. Ideas such as dominance, backward induction, Nash equilibrium, evolutionary stability, commitment, credibility, asymmetric information, adverse selection, and signaling are discussed and applied to games played in class and to examples drawn from economics, politics, the movies, and elsewhere.

I have had the intention of watching through this, but haven't had the time after the first few lectures. The material is recommended, though.

Comment Very unfortunate... (Score 0, Redundant) 426

"Next-Gen Nuclear Power Plant Breaks Ground In China"

Oh no, that is very unfortunate, I'm sad to hear about the breakage.

Do they yet know how much ground has been broken? Is it severely broken?

I suspect that this has been caused by the atomic radiation from the power plant.

Let's hope that the Chinese can get that ground fixed, they need all the space they need as there are so many of them.

Comment Privacy options (Score 1) 474

You seem to worry much about losing your privacy. Most social networking sites have rather extensive privacy settings, so you get to select in detail what should be revealed and to whom.

The problem of course then is that managing these privacy settings can be quite tricky, if you don't have a clear picture of what knobs you have available to turn.

Here is a rather recent and extensive walk-through of the most central privacy settings Facebook offers:

Comment Two separate things here... (Score 3, Insightful) 194

As I understood, the colo in question was not shut down per se, it was simply severed from its internet connectivity as its upstream/backbone internet providers terminated their contract with them. Nothing special about that; business relationships are initiated and terminated all over the world every day.

Consequently, there was no "vigilanteism" in the strict sense as such, where normals citizens take the law in their own hands and act as if they had higher authority than they really have.

It was simply a case of concerned security researchers going to the upstream providers with evidence and saying "look what scum you do business with by providing connectivity, this is bad for the internet on the whole and it hurts your reputation", and the ISPs in question took action. If innocent customers of the rouge colo got hurt when the lines got cut, then they simply have to suffer the consequences of picking a bad host to buy services from.

Of course, if the proof the security researchers had gathered also proved that the shut-down colo in question had committed crimes, then the appropriate authorities need to be involved. But that is another chain of events, separate from the disconnection of the lines.


Thinking of Security Vulnerabilities As Defects 158

SecureThroughObscure writes "ZDNet Zero-Day blogger Nate McFeters has asked the question, 'Should vulnerabilities be treated as defects?' McFeters claims that if vulnerabilities were treated as product defects, companies would have an effective way of forcing developers and business units to focus on security issue. McFeters suggests providing bonuses for good developers, and taking away from bonuses for those that can't keep up. It's an interesting approach that if used, might force companies to take a stronger stance on security related issues."

Slashdot Top Deals

Anything cut to length will be too short.