SEC Decides Telcos Must Give Shareholders a Vote On Net Neutrality
The relative power of the output of significantly above average intellects of the world massively dwarfs the monetary assets of the 'one percenters'. Give me the intellectual output of 20 grade students of my choice and I can own the white house and Greece in a decade.
Smart Camera Tells Tobacco From Marijuana
Yeah, why do we keep demonizing the usage of poppies and hemlock! They are natural therefore good!
FBI File Notes Steve Jobs' Reality Distortion Field
If not by the FBI, then by various investigators (opposition research). Skeletons don't always restrict public service, you just need to know about them to handle them.
Megaupload Shutdown: Should RapidShare and Dropbox Worry?
Rapidshare does not pay users. Rapidshare responds to takedown requests. Rapidshare has been active in court.
Why Richard Stallman Was Right All Along
Considering left/right is an (outdated) method of specifying economic values, claiming (mis)usage of an civil rights trampling law to quell protests is wholly illogical.
MAME Running In Chrome
Difference: The reference implementation is open source.
Raspberry Pi Beta Boards Unveiled
I see that you are attempting to make the troll 2.0 look stupid, by criticizing the very nature of trolling 2.0.
Trolling 2.0 is an attempt to herd a segment of the readership of the materials to be caught in an uncomfortable zone of cognitive dissonance. In this case, it is between their confirmation bias ( the bias is towards low level technologies) and their desire to not be associated with stupidity. This was poorly executed, but in an ideal case, a significant segment of the target would, for a brief moment, be highly inclined to accept and internalize the stupidity, then a painful moment of doubt is to occur, etc, etc, etc
German Court Issues Injunction Against iPhone & iPad
So that's Google's master plan for Android dominance.
Siri Protocol Cracked
for each phone:
id = secure_get_uuid()
No Charges For Child-Whipping Judge Caught On YouTube
But this was a beating for copyright infringement-- a clear case of interstate commerce.
MS Traces Duqu Zero-Day To Font Parsing In Win32k
10 year old equipment? No. But NT4 was released 15 years ago, and was expected to work on hardware considerably older than that. In the mid 90s, security was a joke. Every operating system had a plethora of unpatched, often public, remote root vulnerabilities.
The real question is, "Is there any good reason this was never changed?".
OpenBSD 5.0 Unleashed On the World
OpenBSD WAS more secure in-so-far as its default installation was and is very minimal, and somewhat security oriented. When this was compared to relatively bloated default installations of other distributions/operating systems, it was quite reasonable to consider OpenBSD more secure.
However, as the number of programmer hours on other systems continues to increase relative to OpenBSD, it is unlikely that OpenBSD is significantly more secure than some other modern operating systems (even in this biased criteria).
China's Cyber-Warfare Capabilities Overstated
.... he was implying that perhaps 'cyberattacks' were the method by which sufficient wheel-schematics were acquired, not that it is immoral or odd that they would attempt to acquire such.
Linux Foundation Releases Document On UEFI Secure Boot
I have it right here:
Is Perl Better Than a Randomly Generated Programming Language?
> But then I'm not sure that anything can truely be done "perfectly".
Phelps Clan Tweets Intent To Picket Jobs Funeral Via iPhone
Trolls will be trolls. The only correct response is to give them the minimal level of rights required by the relevant statutes, and to PLEASE AVOID FEEDING THE TROLLS.
AT&T Starts Throttling Heavy Wireless Data Users
False. The scale is discrete, therefore it will not necessarily always be possible to define a top 5% within reasonable margins of error.
Ask Slashdot: Best Way To Destroy Hard Drives?
>anyone who tells you otherwise is in to voodoo and black magic or trying to make some profit.
Not true. Give me a budget of 30 million USD, and I can recover at least 10 sequential bits with 80% certainty.
FBI Leaves Cleared Names On Terrorist Watch List
Terrorist watchlist == reasonable suspicion (in theory, obviously this doesn't hold in practice)
Therefore (with the flawed assumption assumed true) if the name is on terrorist watchlist, you have reasonable suspicion, and can apply that in your dealings with them.
10-Petaflops Supercomputer Being Built For Open Science Community
It's a server used in the stampede cluster.