We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
The review also notes that these programs support Silverlight, the partially open-source technology that is meant to go up against Flash."It's hard not to see Expression Studio as less a true 'suite' than a collection of products that have been co-branded after the fact — partly because Microsoft's other suite, Office, is so tightly knit in comparison. It's tough to see how the products in Expression Studio fit into a single integrated workflow or how they can all be used together, aside from creating XAML applications for Web sites.
"Ulevitch's complaint also stems from the fact that the error redirector breaks some of OpenDNS's functionality. If an OpenDNS user types "digg.xom" by mistake, their browser pulls up the correct "digg.com" instead. But the redirector breaks the free service's typo correction — as well as the browser shortcut feature it unveiled last month. "Google's application breaks just about every user-benefiting feature we provide with client software that no user ever asked for," Ulevitch said.
"... According to the Notice, "the licensees could not conclusively establish" whether the network malfunction was caused by a network disruption within the plant or the malicious activity of an external source. Conversations between the Homeland Security Committee staff and NRC representatives suggest that it is possible that this incident could have come from outside the plant. Unless and until the cause of the excessive network load can be explained, there is no way for either the licensee or the NRC to know that this was not an external distributed denial of service attack. Without a thorough, independent review of the logs and associated data, the assumption that this incident is not an outside attack is unjustifiable.
She also questions whether Zonk and Co. are even using the recommendations that make it to the top of the Firehose ratings:The increased number of unworthy submissions makes more unpleasant work for the editors as well as members of the community. A bigger hose with more crap in it just means that the editors have to read all that crap — and so do the voting members of the community. That's just more work for everyone.
"So far as I can tell, the editors still make the decisions. Good for them. I have no need for democracy in the selection of stories at a site that has done an excellent, if elitist, job of using editorial judgment. That's what makes it such a good site. Drain the hydrant and throw away with the hose.
"That's not actually because a majority of respondents had tried either software and found it lacking, he said. Rather, Microsoft's need to hype the two products through marketing and advertising may have created a backlash among some jaded consumers, he said. Fornell also said that customers have higher expectations for market-leading companies such as Microsoft. 'Microsoft is such a dominant company that economic theory predicts that their customer satisfaction would not be all that high, anyway," he said. "For them to come in at 70 is not all that bad.'
Sprint says it will start offering WiMax service in Chicago and Washington, D.C., later this year."... If Sprint's shareholders panic and Wall Street analysts become too demanding, Sprint could be forced to take the steps demanded by two groups aimed at making the WiMAX investment pay off quickly. If it succumbs to that pressure, Sprint could blow it. That's because the pressure would lead Sprint into demanding too much from its customers, which is the norm in the cellular industry. If Sprint overcharges and requires multi-year contracts for mobile WiMAX as it and all other cellular carriers do for voice service, Sprint's WiMAX effort will be sunk. That's because, for most individuals and enterprises, the compelling nature of fast nationwide wireless access will diminish significantly as prices and complications increase. This isn't cellular service where there's limited competition. Most people can simply wait until they reach a Wi-Fi hotspot or return home or to the office.
This ties into the larger question of the value, believability, and quality of other types of documentation produced by hardware, software, and services vendors — ad copy, press releases, manuals, etc. I know it's hard to generalize, but what are the rules of thumb you use when evaluating the trustworthiness and accuracy of such information?"IDC is making it very clear what you're getting and is leaving it up to you to decide what it's worth. That, indeed, is my question. What are these white papers worth to you? There's no doubt that readers find value in white papers prepared by the vendors themselves, because many are downloaded from our Web site every day. Is it in that context that these vendor-sponsored IDC white papers are read, or do they carry some premium of neutrality in spite of the vendor sponsorship?
Elgan calls on manufacturers to respect his "Gadget Bill of Lights" to restrict the use of nag lights and allow users to turn them off. He also says the industry should pay more attention to industrial design when creating new products."My PC and other computing equipment make my office look like a jet cockpit. I have two LCD monitors, each of which has two indicator lights that flash even when the PC is turned off. The attached sound control has a light on it. My keyboard has multiple lights. The power cord has lights, the printer has lights, and the power button is illuminated. My cable modem and Linksys router flash like crazy all the time. Together, these useless lights create a visual cacophony of blinking, multicolored lights that make me feel like I'm taking part in a NASA stress test for astronaut candidates.
Unfortunately, there's no way to get around this BITS flaw, but Elia Florio, the Symantec researcher who described the exploit, says "... The BITS interface should be designed to be accessible only with a higher level of privilege, or the download jobs created with BITS should be restricted to only trusted URLs.""Using BITS to download malicious files is a clever trick because it bypasses local firewalls, as the download is performed by Windows itself, and does not require suspicious actions for process injection. In fact, the malicious Downloader sample in this case gets access to the BITS component via the COM interface with CoCreateInsance(), and it uses CreateJob() and AddFile() methods to configure the file to download and the destination path.
The article says that the industry has backed down in some states and some credit-freeze laws have passed, but with conditions and business-friendly exceptions — for instance, Delaware had to eliminate a provision that included fines for merchants that failed to secure customer data, before the law could be passed."'The banks, the insurance companies, credit bureaus and retailers really came out of the woodwork and fought hard against it,' [activist George Fitzgerald] said. 'I thought it was good for them and the banks. I thought with all the ID theft going on, people might even get to the point where they'd be afraid of using the [banking] system. I thought that since the credit bureaus were making a bundle of money off of trading consumers' information
... that they should offer a way to protect that information.'
Problems with SL's infrastructure have actually prompted an open letter to Linden Lab, demanding that the company put off new feature enhancements until stability and performance issues are worked out. Phillip Rosedale and other Linden executives say they are addressing concerns about the architecture, but also say they are pushing ahead with features that will make the world more business-friendly — such as as adding 3D audio."The company has no plans to sell products directly thought Second Life, however, noting that the platform is not reliable or scalable. Game servers can only hold about 70 people at once, according to Linden Labs. And, there's no file encryption. In fact, to run a Second Life server, companies have to open multiple ports in their corporate firewall — which tells hackers exactly how to break into company resources.
It's uncertain what the fix is for this for people who already use satellite navigation systems in their cars. The article notes that most devices aren't easy to upgrade."Through trial and error, they discovered that transmitting certain code numbers translates into certain warnings that are displayed on the satellite navigation system. Some were amusing. One code number alerts users that there's a bull fight in progress. Another one indicates delays due to a parade. But some weren't so funny. One tells users that there has been a terrorist incident. Another indicates a bomb alert and another an air crash.
This reporter had contacts in the industry, which enabled him to identify the problem. I wonder how many ordinary consumers have had similar experiences, and have wasted their time and that of their banks trying to track down the cause of the problem?"'Skype intercepts the HTML before it is actually displayed on the browser and then changes the HTML dynamically' to add the link, [SecureWorks researcher Joe] Stewart said. That can sometimes create confusion, he added.
... 'Unfortunately, Skype doesn't have a lot of logic in it that can always figure out when something is a phone number and when something might be an account number.'
"Anderson was told by Jobs in late January 2001 that Jobs had an agreement with the board of directors to grant stock options on Jan. 2, according to the statement from Anderson's attorney. Anderson "cautioned" Jobs that the grant for executives would have to be priced based on the date of the board agreement "or there could be an accounting charge," and also told Jobs the board would have to confirm it had given prior approval for the grant dates "in a legally satisfactory method." Jobs assured him that the board had given approval and Anderson "relied on these statements by Mr. Jobs and from them concluded the grant was being properly handled," the statement said.