Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re: Yes (Score 1) 614

A computer from 2000 would have trouble with opening the photos in a best of vacation album from a low bend camera for editing (8 megapixels is 22 mb/image).

In 1998, I ran a self built Cyrix 6x86MX PR200 based machine with a mind bending 48MB of RAM. With Win95b installed, I worked on extremely large (for the time) game backgrounds for a small startup company. I had no problems opening up files approaching or greatly exceeding the 8MP size of today's cameras. There was a lot of paging and whatnot, but it was still workable under Photoshop 4.0.

I have in service right now a Dell Optiplex GX200 w/933MHz P3 w/1GB PC800 RDRAM (built in 2000) Running Windows 7-32bit. It handles 9MP pictures nicely. thank you very much.

Comment in summary... (Score 1) 246

Recruiters are too lazy to determine whether a person who's last position as "Enterprise Data Architect" where listed skills are scoping, implementing, and managing DB2, MS SQL, and Oracle instances requested by internal clients has the skills necessary for their company's "Database Administrator" position.

I read this as "Do the work for HR/Recruiters, they're not intelligent enough to do it themselves".

Comment I find this interesting... (Score 1) 30

Google has been revealing (via their own transparency reports) that governments want your searches, email, and whatnot that are stored on their servers. Twitter is telling people that the governments are doing the same. I don't think it'll really hit home until Facebook follows suit. Only then will people really "get it" that the government is mining the details of your online life to do whatever they want with it.

I said this before on here: Big Brother was made "cool" and the public welcomed it with open arms. In this case, FB, Twitter, and anything else on the internet along with your cellphones and now your televisions.

Comment This must have been changed quite recently (Score 1) 185

I tried to sign up for a gmail account for use with various *nix message boards maybe a month or two ago and it tried to force me to provide a phone number. There was no Captcha option when I did it. I entered my information and went to the next screen where it demanded a phone number.

I ended up opening a hotmail account instead.

Comment putting on my tin foil hat for a moment... (Score 4, Informative) 185

There's more to it than meets the eye. I don't have a FB account, so I can't fathom why they would ask for you to include your phone number on it for any reason. I do know that Google now REQUIRES it just to open a Gmail account.

Some part of me simply doesn't trust this. We all know about correlation engines and how they work, and we know that the NSA collects and reads your emails (http://www.guardian.co.uk/technology/2012/sep/15/data-whistleblower-constitutional-rights). Now we add into the mix your phone number, which, as we already know is subject to warrant-less tapping (http://www.businessinsider.com/senate-renews-controversial-law-which-allows-warrantless-wiretapping-of-us-citizens-2012-12) and if the number you provides happens to belong to your cellphone, we know that it can act as a covert "roving bug" (http://yro.slashdot.org/story/06/12/02/0415209/fbi-taps-cell-phone-microphones-in-mafia-case). All of this provides more data to track you, what you do, who you interact with, who you're near at any given moment and those individuals interactions... All in the name of "keeping you/this country safe".

This simply doesn't sit well with me.

Comment If you have nothing to hide... (Score 5, Insightful) 225

Finally the line "If you have nothing to hide, you have nothing to fear" can be used against law enforcement. Since law enforcement agencies across the country are adopting ever more invasive tactics to monitor citizens, it's refreshing to see that we can finally monitor them without fear of reprisal.

Comment This was several years in the making... (Score 1) 186

Immediately after the Symantec/Huawei joint venture in 2007, backdoors and trojans began to appear that targeted Symantec products. Symantec products have been a staple of DoD environments for a number of years (http://www.symantec.com/press/2003/n030527a.html), so something like this likely raised more than a few eyebrows. I'm honestly surprised that it took this long considering how much trust we have in the Chinese (extremely little) and the fact that Huawei products had already been blacklisted by the DoD.

Slashdot Top Deals

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...