Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:States want "rights" over local broadband (Score 1) 165

You have it a little backwards; pre-civil war the slave states were against states rights as that implied the ability for states to allow escaped slaves to exist in relative freedom in the North. They depended on the strong federal government to defend the slavery laws which were embodied in the constitution, (as well as the national tariffs that protected the cotton growers from competition.) It wasn't even talked about much once the Union occupation / reconstruction ended, since Jim Crow was tolerated on a national level. It was really only after Truman integrated the military, and especially Brown vs. the Board of Education that it became such a standard complaint from the racists that their state laws should overrule anything else. That ATT and Comcast can profit off of that, well, that's the free market for you!

Submission + - Icy Volcanoes May Erupt on Pluto (

An anonymous reader writes: The New Horizons probe may have discovered two possible ice volcanoes on the surface of Pluto. "These are two really extraordinary features. Nothing like this has ever been seen in the solar system." Oliver White, a New Horizons postdoctoral researcher with NASA's Ames Research Center in California said. The mountains have been informally named Wright Mons and Picard Mons, and at their crests, each peak hosts a central crater, reminiscent of peaks called "shield volcanoes" on Earth. "Whatever they are, they're definitely weird" — 'volcanoes' is the least weird hypothesis at the moment," White says.

Submission + - Deep dive on Breakthrough Prize winner Ian Agol's work (

An anonymous reader writes: In March 2012, Ian Agol, of the University of California at Berkeley, electrified the mathematics community by announcing a proof to “Wise’s conjecture,” which settled the last four of Thurston’s questions in one stroke.

Mathematicians called the result the end of an era.

Submission + - Computerworld: Fury and fear in Ohio as IT jobs go to India (

ErichTheRed writes: A company called Cengage Learning now joins the Toys 'R Us, Disney and Southern California Edison IT offshoring club. Apparently, even IT workers in low-cost parts of the country are too expensive and their work is being sent to Cognizant, one of the largest H-1B visa users. As a final insult, the article describes a pretty humiliating termination process was used. Is it time to think about a professional organization before IT goes the way of manufacturing?

Submission + - 8 of the 10 Security Flaws Used by Cyber-Criminals This Year Were Flash Bugs

An anonymous reader writes: Adobe Flash Player provided eight of the top 10 vulnerabilities used by exploit kits in 2015. Angler is currently the most popular exploit kit, regularly tied to malware including Cryptolocker. Vulnerabilities in Microsoft’s Internet Explorer and Silverlight are also major targets. All of these are the conclusions of a Recorded Future report.

Comment Re:In other news (Score 1) 403

Back in the '80s, a company distributing Russian or East German propaganda videos would be shut down

What a crock of shit. I used to go to my friends house and browse his copy of "Soviet Life" all the time. Another friend regularly travelled to both East Germany and Poland in the early 80's on a regular basis. Sure, they earned a thick folder from Reagan's black hat brigades, but otherwise it didn't impact their lives one bit.

Submission + - Attempted Breach of NSA HQ Checkpoint; One Shot Dead (

seven of five writes: One man is dead and another severely injured after a shootout at one of the main gates of the National Security Agency located at Fort Meade, Maryland.

Two men dressed as women attempted to “penetrate” the entry point with their vehicle when a shootout occurred, officials said.
The FBI said they do not believe the incident is related to terrorism.

Submission + - China's Foreign Ministry: China did not attack Github, we are the major victims. (

An anonymous reader writes: At the Regular Press Conference on March 30, China's Foreign Ministry Spokesperson Hua Chunying responded on the charge of DDoS attack over Github. She said "It is quite odd that every time a website in the US or any other country is under attack, there will be speculation that Chinese hackers are behind it. I'd like to remind you that China is one of the major victims of cyber attacks. We have been underlining that China hopes to work with the international community to speed up the making of international rules and jointly keep the cyber space peaceful, secure, open and cooperative. It is hoped that all parties can work in concert to address hacker attacks in a positive and constructive manner."
She obviously said nothing.

Submission + - Cetaceans Found Able to Focus Sound in Echolocation

Rambo Tribble writes: A recent study from Denmark has determined that porpoises, dolphins and whales can focus the sounds they make, described as "clicks and buzzes", when hunting. This appears to exceed even the capabilities of bats. One researcher described the ability as, "like adjusting a flashlight". The BBC offers approachable, and illustrated coverage.

Submission + - Systemd Devs Fork Linux Kernel ( 3

An anonymous reader writes: Now it appears as though the systemd developers have found a solution to kernel compatibility problems and a way to extend their philosophy of placing all key operating system components in one repository. According to Ivan Gotyaovich, one of the developers working on systemd, the project intends to maintain its own fork of the Linux kernel. "There are problems, problems in collaboration, problems with compatibility across versions. Forking the kernel gives us control over these issues, gives us control over almost all key parts of the stack."

Slashdot Top Deals

It is masked but always present. I don't know who built to it. It came before the first kernel.