Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:I Disagree (Score 1) 103

Example tile URLs from my squid log:

http://lh6.ggpht.com/io8g_Aj_Hm1kxRup7bzw0e2AtUOpGaINg_hTKPLIABKsN81SNaTC_EQ54Uw=x7-y2-z7
http://lh3.ggpht.com/io8g_Aj_Hm1kxRup7bzw0e2AtUOpGaINg_hTKPLIABKsN81SNaTC_EQ54Uw=x17-y4-z6
http://lh6.ggpht.com/io8g_Aj_Hm1kxRup7bzw0e2AtUOpGaINg_hTKPLIABKsN81SNaTC_EQ54Uw=x10-y1-z5
http://lh3.ggpht.com/io8g_Aj_Hm1kxRup7bzw0e2AtUOpGaINg_hTKPLIABKsN81SNaTC_EQ54Uw=x6-y1-z5

I think it's pretty obvious what part of the URL you need to replace if you want to download all tiles for a particular resolution.

Comment Re:Privacy? (Score 3, Interesting) 549

Required liability insurance should not work as punishment. I can understand why insurance companies may want to increase the premium, but outright denying coverage should not be allowed.

This is similar to the issue of sex offender registration. If a guy has paid from his crimes (fine, driving ban, jail, whatever), then he should not have to suffer any more.

Comment Re:Beat me to it. (Score 1) 467

At which point students start questioning what they are paying their tuition for. I myself learned pretty much everything from reading online guides/howtos and manpages, and I do believe that this is the most effective way to go. It seems to me that the answer is that a Linux course does not belong to a university-level CS curriculum. Students will have to learn it anyway, usually by the time they take an OS course (typically because of programming projects involving libpthread). A good idea would be to have a TA install Linux and/or teach some basic command-line tools in a recitation, but wasting more time on it is not necessary.

Comment Re:I like "traitorware" (Score 4, Informative) 263

I *like* cameras that incorporates metadata. This protects me from lawsuits and proves that the picture is mine and can be used however I want and as often I want.

Sure, someone who wants to claim ownership of a picture would never be able to insert desired metadata in the file.

People misuse printers to print out pedophilia ... counterfeiting ... threatening letters ...

You forgot terrorists. They also use printers.

Yes, there are legitimate uses for all these traitorware features in software/hardware. The point is that these features should be opt in and disabled by default, so that people who truly want them can enable them.

Comment Re:A Simple Solution (Score 1) 548

As you note a la carte pricing will end up being more expensive. ISPs will charge $50/month for the first GB and $1/GB after that. Everyone pays at least as much as before, but anything more than minimal use is financially painful. At that point "broadband" becomes useless and everyone might as well switch to a $10 unlimited dial-up plan.

Yes, I forgot to mention that this scheme will only work when ISPs are unable to set such unreasonable pricing (either through free (perfect) market, or through heavy regulation / government control). Of course, this raises a question whether Internet access is a luxury or a basic need that needs to be provided to all citizens.

Comment Re:A Simple Solution (Score 1) 548

You are correct. In fact, charging per sent/received byte of data could fix a number of economical and technical problems in the network.

First, there is this problem of flat rates. For some reason, people seem to like them (is it because they are predictable?), but I don't see any logic behind this. Everyone hates prepaying parking some extra minutes to be safe, leaving earlier, and regretting wasted money. I don't see why this should be different with Internet plans. People who use the Internet to check emails and surf text web would not have to pay for the minimum plan (at least $40/mo). Of course, that would mean less profit for ISPs, which is why per-byte pricing is not popular.

Second, this will solve technical problem of flow fairness. The whole reason why "download accelerators" and (partially) p2p programs exist is because TCP fairness is inherently broken, as you can increase your speed on a congested link simply by opening more connections. Charging per byte would tie all flows to an economic entity, ensuring perfect fairness (you pay more -> you get bigger share of a congested link).

Third, pricing can be dynamic ("congestion pricing"). We can borrow ideas from power companies that charge (typically industrial/commercial) users less per KWh in off-peak hours when the network is underutilized, and similarly charge more during peak hours. While this works the best between end user and their ISP, it could be extended to relationships between ISPs.

Fourth, end users could have more control over prioritizing their traffic with respect to their own and other users' traffic. Suppose the network is congested, and I am willing to pay more to get my VoIP traffic delivered on time, but I don't care as much for p2p traffic (it can be delayed/rescheduled so I can save money).

In fact, this is something I'm working on as a mini-research project, so it would be interesting if it worked in reality.

Submission + - Comcast Charges Level 3 for Netflix Traffic (google.com) 1

NicknamesAreStupid writes: On the eve of purchasing 51% of NBC, Comcast has decided to turn "net neutrality" on its ear by placing a surcharge on Level 3's Netflix traffic, which has become a major load. Of course, Netflix competes with Comcast. Will this help Comcast clear the SEC and FCC hurdles to purchase NBC? Judging from the way the SEC handled the Wall Street mess — YES!

Comment Centralization (Score 3, Insightful) 143

I remember when people were concerned about their privacy and complained about Gmail mining their emails. Facebook will take it to a whole new level, complete with value-added features such as censorship. People have to understand that decentralization is the only way to go; putting all your eggs in one basket (facebook) will never lead to anything good.

Comment Re:Just wait for the GOTY. (Score 1) 261

Obligatory XKCD. But seriously, I also follow this strategy. It really amazes me how resource-hungry modern games have become. Fallout:NV lags on low settings on my NV 8800 GTS 512 that was considered top card only a couple of years ago, and no, I'm not spending another $1.3k on a new system any time soon. Back when CRT monitors were popular at least you could play on a lower resolution; now, non-native resolutions just look ugly.

Comment Re:Good For Google (Score 1) 415

It's not about 'evil intent', it's about a program that behaves badly...it doesn't appear in the list of installed apps, it doesn't use the normal install/uninstall procedures, etc.

There is nothing wrong with an application that doesn't conform to standard practices as long as system administrator is fully aware of what the application does, and knowingly chooses to install it. I may have my own reasons why I want to run a rootkit on my machine (honeypots, etc), and Google is not the one who should deprive me of this opportunity. Now, it would be unethical for me to install this app to spy on somebody, but this should be left to my conscience without Google being a moral police.

I thought the general consensus here on /. was that since I own the hardware, I should be able to use it as I please, so why is my opinion so unpopular?

Comment Re:Shotwell instead of f-spot, almost Yay (Score 1) 473

WTH?? Why are you avoiding mechanism which is in place for those things, namely XDG user dirs? Shotwell, as every good behaving application, uses directory which user defined for storing pictures.

I'm not the OP, but I used the same workaround. The answer is simple - I didn't know about XDG, the command needed to update directory, its parameters, where the config file is located, or whether the app in question is "good behaving". Doing rm & ln is simple, gets the job done, and doesn't require additional googling. The same thing really happened when I installed sun java and didn't know about the alternatives mechanism - manually overriding symlinks, or even prepending java's bin directory to your $PATH is easier than trying to figure out how to do it properly. Of course now that I know about these tools I will use them, but you shouldn't really blame the OP for using something he knows to quickly fix the problem instead of spending additional time learning about new tools.

KDE

KDE 4.5 Released 302

An anonymous reader writes "KDE 4.5.0 has been released to the world. See the release announcement for details. Highlights include a Webkit browser rendering option for Konqueror, a new caching mechanism for a faster experience and a re-worked notification system. Another new feature is Perl bindings, in addition to Python, Ruby and JavaScript support. The Phonon multimedia library now integrates with PulseAudio. See this interview with KDE developer and spokesperson Sebastian Kugler on how KDE can continue to be innovative in the KDE4 age. Packages should be available for most Linux distributions in the coming days. More than 16000 bug fixes were committed since 4.4."

Submission + - Slashdot is Dying, New York Times Confims It (nytimes.com) 12

An anonymous reader writes: The New York Times is running a story about how Slashdot has dropped in popularity compared to other news sites in social web space. Quote: "Why is Slashdot almost irrelevant to the social media community? It used to be the biggest driver of traffic to tech web sites, but now it hardly delivers any traffic at all to them. We explore some of the reasons, including input from our own community."

Slashdot Top Deals

The sooner all the animals are extinct, the sooner we'll find their money. - Ed Bluestone

Working...