First time accepted submitter oxidus60659 writes "I currently work as a programmer for a small business. They have provided me with a laptop and a 27" BenQ monitor on a Neo-Flex stand. The problem is that my main screen is the tiny laptop right in front of me. The 27" monitor is on the left at a very different height position. I want to put the 27" monitor directly above my laptop so I'm looking up rather than to the left for all my coding on the bigger monitor. The stand does not have a high enough setting to accommodate this. What would be a good stand that can mount to a desk high enough to be above a laptop? What kind of monitor setup do you use when programming?"
Become a fan of Slashdot on Facebook
GiboNZ writes "Like many others, I easily get distracted when working on a computer. Say I work on a task — be it a programming job or bookkeeping or whatever — and need to quickly check something on Google. Unfortunately after a while I often find myself on Slashdot or eBay or reading emails instead of continuing with the job I was doing before. Maybe if I had a 'single-tasking desktop' it wouldn't be such an issue. I couldn't Alt-Tab to my email client with tempting 200 unread emails, Alt-Tab to browser with 10 tabs open for later, Alt-Tab to unfinished document from yesterday, Alt-Tab to ... you know what I mean. I want to be forced by some technical means to work on the problem I should work on. Will alone doesn't work — I tried. Like when mowing a lawn — there I've got nothing else to do and I keep mowing until it's finished. If I could multitask in the same way I can on a computer our little backyard would take me the whole day to do. Any ideas how to inhibit the distractions ever present on modern multi-tasking internet-connected desktops? I genuinely want to be more productive but the technology is against me."
yenrabbit writes "A friend has just told me he has 80 CRT TVs, a stack of DVD players and hundreds of VCR machines, all broken and all mine free of charge. I can already think of a few awesome components I can extract (flyback transformers for high voltage contraptions and so on) and have a few ideas, such as DVD lasers, that I can build. But what else can be made from such a treasure-trove of components, and how would one go about processing such a large volume of stuff with the least amount of effort? Also, I don't have access to online shopping so I'd also like a pain free way of salvaging many simpler parts such as resistors as well." Another reader sent in a similar question: "The other day I went down to my University's property disposition center for the first time. In addition to mundane things like chairs and desks, it also had a wealth of technological devices, from old PCs and monitors to obscure medical and chemistry equipment. Honestly, I was a bit overwhelmed. I just don't know what I'd do with a old gene sequencing machine or a broken oscilloscope. Any ideas for fun projects? Or better yet, suggestions on how I can figure out which machines (or their components) are worth playing with?"
RandyOo writes "I've recently learned that our neighborhood is getting a fiber optic network, with a 100Mbps connection in each subscriber's home. IPv6 connectivity is included, but unfortunately, the only IPv4 connectivity they offer is Carrier Grade NAT, due to the exhaustion of IPv4 addresses in RIPE. I travel a lot, and I've become accustomed to accessing my home network via SSH, VNC, etc. It appears uPNP and PMP are unsupported by CGN. So, without a publicly-routed IPv4 address, I'll be unable to reach devices on my home network from an IPv4-only connection, such as the one provided by my cellular carrier (which also appears to be behind some kind of NAT, by the way). If the ISP isn't willing or able to sell me an IPv4 address, what alternatives do I have? I'd be willing to pay a small monthly fee for, say, a VPN service that would allow me to accept incoming connection requests on a range of ports on their Internet-facing IPv4 address. Does such a service exist?"
Nerval's Lobster writes "As we discussed yesterday, Google is bringing a Quickoffice viewer to its new high-end Chromebook Pixel, with full editing ability expected within three months. According to TechCrunch, Quickoffice-on-Chromebooks comes courtesy of Native Client. If Chromebooks prove a hit (and Google ports Quickoffice onto devices other than the ultra-high-priced Chromebook Pixel), could that mean the beginning of the end of Microsoft Office's market dominance of the productivity software space? While Microsoft has been pushing into the cloud with software like Office 365, that's also Google's home territory. But can Google actually disrupt the game?"
eegad writes "I've been thinking a lot about how much information I give to technology companies like Google and Facebook and how I'm not super comfortable with what I even dimly know about how they're handling and selling it. Is it time for major companies like this, who offer arguably utility-like services for free in exchange for info, to start giving customers a choice about how to 'pay' for their service? I'd much rather pony up a monthly fee to access all the Google services I use, for example, and be assured that no tracking or selling of my information is going on. I'm not aware of how much money these companies might make from selling data about a particular individual, but could it possibly be more than the $20 or $30 a month I'd fork over to know that my privacy is a little more secure? Is this a pipe dream, or are there other people who would happily pay for their private use of these services? What kinds of costs or problems could be involved with companies implementing this type of dual business model?"
An anonymous reader writes "It appears that two weeks ago my email address got into the wrong database. Since that time there have been continuing attempts to access my accounts and create new accounts in my name. I have received emails asking me to click the link below to confirm I want to create an account with Twitter, Facebook, Apple Games Center, Facebook mobile account, and numerous pornographic sites. I have not attempted to create accounts on any of these services. I have also received 16 notices from Apple about how to reset my Apple ID. I am guessing these notices are being automatically generated in response to too many failed login attempts. At this point I have no reason to believe any of my accounts have been compromised but I see no good response."
New submitter OlivierB writes "I am moving to a new house in the UK. The house will have very fast broadband but there is only one TV/cable aerial to plug into which is also very inconveniently located in the property. The cable TV provider can move it (for a high fee), but the biggest issue is that their channel packages are just too expensive and not appealing to me. Ideally, I would like access to the UK Freeview channels, and maybe a few extras such as Discovery Channel, Eurosport etc. All of this content would be available via IPTV, which I could watch from an HTPC or simple set-top boxes. Do you have any ideas to share with me?"
skade88 writes "As I get older, I find the little details of my life slip away from my memory after years and decades pass. I find myself wishing I had a way to record at least sound and video of my entire life. It would be nice to be able to go back and see what I was like when I was younger without the fog of memory clouding my view of the past. It would be cool to share with my boy friend and future kids how I was when I was younger by just showing them video from my life. Do y'all know of any good way to do this? I would settle for recording what I see from a first person point of view. There is also concerns that range beyond the technical. If I were to record my entire life, that would mean also recording other people, when they are interacting with me on a daily basis. What sort of privacy laws pertain to this? Even without laws, would others act differently around me because they were being recorded with my life record? How would it make you feel if your friend or family member did this?"
jetkins writes "As the owner of my own mail domain, I have the luxury of being able to create unique email addresses to use when registering with web sites and providers. So when I started to receive virus-infected emails recently, at an address that I created exclusively for use with a well-known provider of tools for the Systems Administration community (and which I have never used anywhere else), I knew immediately that either their systems or their subscriber list had been compromised. I passed my concerns on to a couple of their employees whom I know socially, and they informed me that they had passed it up the food chain. I have never received any sort of official response, nor seen any public notification or acceptance of this situation. When I received another virus-infected email at that same address this week, I posted a polite note on their Facebook page. Again, nothing. If it was a company in any other field, I might expect this degree of nonchalance, but given the fact that this company is staffed by — and primarily services — geeks, I'm a little taken aback by their apparent reticence. So, since the polite, behind-the-scenes approach appears to have no effect, I now throw it out to the group consciousness: Am I being paranoid, or are these folks being unreasonable in refusing to accept or even acknowledge that a problem might exist? What would you recommend as my next course of action?"
New submitter capsfan100 writes "At Christmas I got an $89 Android tablet by MID. The 7" tablet has sufficient RAM, etc. The battery, however, was rather pathetic out of the box. It's already fading, so we know where this is headed — decent tablet, but it constantly needs the plug. How would you take this 'old' tablet and turn it into a rockin' stereo component? Is there a ROM build out there titled Pimp My Tablet Into An MP3 Player? The current music app can look up lyrics on-line. I'd like to keep that feature. Any ideas on a good app for syncing music videos with my *ahem* random music collection? Any fun, off-beat party apps this middle-aged suburban dad hasn't heard of? Since the Android security nightmare is so well documented, I'd rather not use services that require passwords. I also need top-notch security and monitoring software so I can see what my kids and their friends are doing with it next year when I'm not home while keeping them anonymous and safe on-line. As for my living room stereo system, how best to mount a sleek MP3 tablet? I was thinking velcro, but it would ruin the feel. Maybe a wall-mount arm like my HDTV has? We want to be able to unplug it and move around the room, so I'll need to upgrade the speakers to wireless. Any thoughts there? I'm not afraid of the command line — indeed, I insist on one — but no Gentoo-type projects, thank you. Just a good sleek and secure ROM for optimal tunage with all the top apps the kids are using today."
Nerval's Lobster writes "Earlier this month, a very public argument erupted between Tesla Motors CEO Elon Musk and New York Times reporter John Broder, who claimed in a Feb. 8 column that his electric-powered Model S sedan had ground to a halt on a lonely stretch of Connecticut highway, starved for power. Musk retaliated by publishing the data from Broder's test drive, which suggested the reporter had driven the vehicle at faster speeds than he had claimed in the article (which would have drained the battery at a quicker rate) and failed to fully charge the car at available stations. Musk seems to have let the whole thing drop, but the whole brouhaha raises a point that perhaps deserves further exploration: the rising use of sensors in cars, and whether an automobile company—or any other entity, for that matter—has the right to take data from those sensors and use it for their own ends without the owner's permission. (For his part, Musk has claimed that Tesla only turns on data logging with 'explicit written permission from customers.') What do you think, Slashdot? Do we need the equivalent of a 'Do-Not-Track' option for cars?"
New submitter sc30317 writes "My house got robbed on Friday, and all of our electronics got stolen. Everything. Now, I have to go out and buy all new electronics with the insurance money. We had five TVs (don't ask), three laptops, a Bose Sound dock with iPod, a digital camera, and a desktop stolen. It's looking like I am going to get around $10K from the insurance company to replace everything. What would you do if you had to replace ALL of your technology in your house at once? I'm thinking: replace TVs; nice Desktop; new speakers; and new, cool stuff I don't know about (suggestions welcome). I already added a DVR security system, so hopefully the new things won't get burgled! Looking for suggestions to utilize my money in order to get the best stuff. Also, no Windows computers allowed in my house."
An anonymous reader writes "Recently, I had found out (through my log files) that my wireless router was subject to a Wi-Fi Protected Setup (WPS) brute force PIN attack. After looking on the Internet and discovering that there are indeed many vulnerabilities to WPS, I disabled it. After a few days, I noticed that I kept intermittently getting disconnected at around the same time every day (indicative of a WPA deauthentication handshake capture attempt). I also noticed that an evil twin has been set up in an effort to get me to connect to it. Through Wi-Fi monitoring software, I have noticed that certain MAC addresses are connected to multiple WEP and WPA2 access points in my neighborhood. I believe that I (and my neighbors) may be dealing with an advanced Wi-Fi leech. What can I do in this situation? Should I bother purchasing a directional antenna, figuring out exactly where the clients are situated, and knocking on their door? Is this something the local police can help me with?"
First time accepted submitter d33tah writes "In the summer term of my final year of IT's bachelor's course in my university, every student is obliged to develop his own project; the only requirement is that the application would use any kind of a database. While others are thinking of another useless system for an imaginary company that nobody would actually use, I'd rather hack up something the FL/OSS community actually needs. The problem is — how to figure out what it could be?"