Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Moon landing 1969 (Score 3, Funny) 203

How is it that astronauts managed to land on the moon in 1969 but the next mission to get people to the moon will take until 2020? With today's engineering tech - CFD software, advanced materials science, VR simulation, rapid prototyping technology - and lots of commercial sattelites shot into space every year, it should be much easier to get people to the moon and back safely than it must have been in the 60s. Unless of course that landing was faked as some people allege.

Submission + - Sonic advertising - like it or not ( 1

newtley writes: "Advertisers are determined to get into your head by one means or another, and Holosonic Research Labs has found yet another way of invading your privacy in the name of forcing you pay attention. You're walking down a street in New York when all of a sudden, 'Who's that?' — whispers a woman's voice. 'Who's There?' No. You weren't having a schizoid episode. You were being subjected to 'sound in a narrow beam, just like light' without your permission. It was coming at you from a rooftop speaker 7 stories up. Don't want to be bombarded by sonic ads? Tough. Wear ear-plugs."

Submission + - Why Nerds are Nerds! (

hydra writes: "Research by the Institute of Weird Thinkers has today published their conclusions on the causes of Nerdhood. Apparently, the study which investigated over 200 famous nerds found that 95% of those studied were in fact weird because they had a weirdly complicated childhood. Many sought refuge in a life of Nerdhood because they never felt in control as a child. Others took up Nerdhood to avoid social situations and more still became nerds because they wished to avoid this stupid, pointless life altogether — but didn't want to hurt themselves to do it. Whatever the reason Nerds, keep doing it — or go and find a shrink."

Submission + - Why isn't privacy invasion considered "theft&#

An anonymous reader writes: Its become common practice for companies and industries to refer to a wide variety of digital actions as "theft". If you download media content without paying for it, you have stolen it. If you download a pirated copy of software to check out its suitability, you have stolen it. If you use any copyrighted material in a Youtube video without consent — well, you've stolen it. God forbid if get your hands on data a company considers "confidential" — instant arrest and imprisonment. Theft, theft, theft is the mantra and it seems that not a day goes by without some industry association reminding the world that all internet users are thieves at heart.

What about the privacy of ordinary people? Mainstream media like the BBC and CNN always uses soft terms like "privacy concerns" to make it seem like a "well it isn't very nice, but its hardly a hard crime" thing. But is this actually the case? Does having to have your likeness recorded for an unknown period of time by CCTV cameras when you go for a stroll past some shops, or having your IP logged by each website you take a glance at not "take" something from you? What about datamining, where computer algorithms try to "figure out" where you are in the world, what kind of person you are, what your interests, consumption habits and preferences look like, what you might be likely to buy or spend? Again, does this not constitute "taking" something from you that you have not voluntarily provided? Would you shop at a creepy record store or bookstore where some scientist in a labcoat follows you from shelf to shelf with a clipboard and notes down the exact time you looked at items, the sequence you looked at them in, and some information that lets the shop know that you, not some new customer is back and browsing for more? Would you consent to bricks and mortar shops coating sidewalks with a special substance that makes your shoeprints stand out in bright colors and let them figure out where you came from or where you went after you checked out?

Is it not "theft" to take something a person cares about and cannot get back once its taken? Is it not "theft" to force a person to leave an "imprint" of their presence behind with every digital step, no matter how casual or insignificant? To record someone's activities as if its "normal" that every step you take should be recorded in some way and become the property of whoever recorded it? To whisk someone's data into some database at a datacenter where the person who effectively OWNS the data will never see it again?

And would labeling privacy invasion "theft" or "stealing" in daily discourse be an effective way to corner those organizations, digital or not, that trample on people's privacy without appology? Should we remind mainstream media organizations that use fluffy terms like "privacy concerns" to add that "privacy infringement is in fact theft"? Should we treat companies that don't take privacy seriously as "thieves" and openly label them as such?

Submission + - The Difficult Game of Online Digital Rentals (

DECS writes: Apple is reportedly considering an expansion of its Low Def video iTunes offerings to include video rentals. However, a string of disposable digital rental failures from DIVX discs in 1998 to the current consumer indifference toward exploding digital media rentals from Microsoft and Real pose the question: how can Apple succeed in a rental market where so many other online media outlets have failed or are struggling for relevance? The answer involves taking an new approach that follows what works in the physical world, and respects the existing culture rather than trying to overturn it. Here's what's involved in the complex world of digital rentals, and How Apple could deliver workable iTunes Rentals.

Submission + - OS2 Open Source Petition (

Kim Haverblad writes: "More than two years ago on September 25, 2005, OS2 World.Com sent IBM a letter with a petition that contained 11,613 signatures requesting IBM to release the source code of Operating System 2 (OS/2 Warp) — or at least release the source code that IBM owns — to the public under an open source license. Sadly IBM was ignorant enough to not answer the first letter and this is why we sent a second letter to IBM.

On November 19, 2007, OS2 World.Com sent the second letter to IBM where we insisted on implementing the stipulations contained in this petition because we believe that OS/2 is an important part of the history of the Operating System, and furthermore, it still contains values that the computer science field considers unique.

The petition can be found at following url:"


Submission + - Wis. Teacher Arrested for Blog Comment (

stoolpigeon writes: "James Buss, a Milwaukee high school chemistry teacher was arrested for allegedly posting an anonymous comment online praising the Columbine shooters. Some were disturbed by the post police say James Buss left on a conservative blog, but other observers said it was a sarcastic attempt to discredit critics of education spending."

Submission + - Egyptian Blogger Silenced by YouTube

Frosty Piss writes: "A Egyptian human rights activist has been muzzled after YouTube and Yahoo! shut down accounts belonging to the award-winning blogger. Cairo-based Wael Abbas regularly writes and posts video about police brutality, torture and sexual harassment in Egypt. One of the videos — of an Egyptian bus driver being sodomized with a stick by a police officer — was used as evidence to convict two officers of brutality, a rare occurrence in a country where human-rights groups say torture is rampant. YouTube said the decision to remove Abbas' videos had nothing to do with the Egyptian government, but was rather an internal decision."

Submission + - Adverts to appear in PDFs 1

An anonymous reader writes: The BBC is reporting that Yahoo! has a deal with Adobe to allow adverts to appear in PDFs. The ads won't appear when the document is printed. Ad-blocker for PDF viewing anyone?
United States

Submission + - U.S. House says the Internet is terrorist threat

GayBliss writes: "The U.S. House of Representatives passed a bill (H.R. 1955) last month, by a vote of 404 to 6, that defines the Internet as a terrorist tool that Congress needs to develop and implement methods to combat. The first 3 "findings" pretty much sums it up:

`The Congress finds the following:

`(1) The development and implementation of methods and processes that can be utilized to prevent violent radicalization, homegrown terrorism, and ideologically based violence in the United States is critical to combating domestic terrorism.

`(2) The promotion of violent radicalization, homegrown terrorism, and ideologically based violence exists in the United States and poses a threat to homeland security.

`(3) The Internet has aided in facilitating violent radicalization, ideologically based violence, and the homegrown terrorism process in the United States by providing access to broad and constant streams of terrorist-related propaganda to United States citizens.
The bill now moves to the Senate for a vote. So where do you suppose they are going with this? Should we wait around to find out, or is it time to call your congressman?"
United States

Submission + - Counterbalance to Unfair Moderation Online (

censored writes: A large number of users are unnecessarily censored online because of factors like difference of opinion, which directly violates your right to free speech. Dont Censor Me acts as a forum where users can voice violations to their speech online and hold websites accountable for any unfair moderation. Their Digg section also shows that buried comments are usually just victim to unpopular crowd sentiment.

Slashdot Top Deals

In English, every word can be verbed. Would that it were so in our programming languages.