Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Tool problems (Score 1) 372

The author has a point. At one time, there were development tools, which cost money, were relatively static, and which were expected to work correctly. Then there were applications, which relied on the development tools.

We now have a huge proliferation of tools, many of them open source, poorly integrated with each other, and most badly maintained. Worse, because everything has a client side and a server side, there are usually two independent tool chains involved.

Web programming is far too complex for how little most web sites do. (And the code quality is awful. Open a browser console and watch the errors scroll by.)

The Internet

Journal Journal: Was the Internet Created for Covert Domestic Surveillance?

"From its creation by DoD contracts and grants to research institutions, there have been aspersions cast by those easily dismissed as "fringe" commentators, on the nefarious, or at least covert, motivation to create the Internet. Conspiracy theory may have been met by reality in recent months with now commonplace reporting, first by Wikileaks and later, in the more extensive

Submission + - Was the Internet Originally Created for Covert Domestic Surveillance?

Jeremiah Cornelius writes: From its creation by DoD contracts and grants to research institutions, there have been aspersions cast by those easily dismissed as "fringe" commentators, on the nefarious, or at least covert, motivation to create the Internet. Conspiracy theory may have been met by reality in recent months with now commonplace reporting, first by Wikileaks and later, in the more extensive Edward Snowden revelations. It is still almost canon, that NSA mass-surveillance and warrantless information analysis occurred through coopting the burgeoning Internet, and diverting traffic in a way that is counter to the ideals of its creators and promoters. But what if the social, commercial Internet were always intended as a sort of giant honeypot? The idea would still seem farfetched, if it weren't recently disclosed by William Binney that the NSA is recording 80% of all US phone conversations — not simply metadata. Closer examination of the record shows that ARPAnet was being used to clandestinely gather information on the legitimate activities of US citizens — and transmit the information to the US Army Intelligence Command NSA — as far back as 1968! According to articles published in 1975 by MIT in "The Tech":


"via the ARPANET, a computer network connecting more than 50 government agencies and universities throughout the country. The network is funded by the Department of Defense Advanced Research Projects Agency (ARPA)... The information, according to intelligence sources, was transferred and stored at the headquarters of the National Security Agency (NSA), at Fort Meade, Maryland. The Army files were transmitted on the ARPANET in about January 1972, sources say, more than two years after the material — and the data banks maintained at the [Army's] Fort Holabird facility — were ordered destroyed."


MIT officials were worried 40 years ago, about this abuse of interconnected TCP communications and the complicity of their own research scientists. These concerns arose at the height of the Watergate fallout and downfall of President Nixon for illegal wiretapping and information theft allegations. The danger of Government "record keeping" was outlined by Senator Sam Ervin, in an address to MIT that was also profiled in the same publication. Clearly, this did not begin in the last decade, and clearly pre-dates the 2001 "Global War on Terror" pretext. It is important to remember, the NSA was an almost unknown agency at this time, and was chartered to strictly forbid intel on US citizens and those dwelling within US borders.

Submission + - The Secret Government Rulebook For Labeling You a Terrorist (firstlook.org) 1

Advocatus Diaboli writes: The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. ...The heart of the document revolves around the rules for placing individuals on a watchlist. “All executive departments and agencies,” the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—”reasonable suspicion“—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it. In the chapter on “Minimum Substantive Derogatory Criteria”—even the title is hard to digest—the key sentence on reasonable suspicion offers little clarity...

Submission + - Finding life in space by looking for extraterrestrial pollution (networkworld.com)

coondoggie writes: If what we know as advanced life exists anywhere other than Earth, then perhaps they are dirtying their atmosphere as much as we have and that we could use such pollution components to perhaps more easily spot such planets in the universe. That’s the basics of new research put for this week by researchers at the Harvard-Smithsonian Center for Astrophysics that stated if we could spot the fingerprints of certain pollutants under ideal conditions, it would offer a new approach in the search for extraterrestrial intelligence.

Submission + - Researchers Print Electronic Memory On Paper (acs.org)

MTorrice writes: Electronics printed on paper promise to be cheap, flexible, and recyclable, and could lead to applications such as smart labels on foods and pharmaceuticals or as wearable medical sensors. Many engineers have managed to print transistors and solar cells on paper, but one key component of a smart device has been missing—memory. Now a group of researchers has developed a method that uses ink-jet technology to print resistive random access memory on an ordinary piece of 8.5 by 11 inches paper. The memory is robust: Engineers could bend the device 1,000 times without any loss of performance.

Comment Re:110 or 240v (Score 1) 260

It seems contradictory that they're worried about power factor, and also want to force contestants to output nice clean sine waves. Best way to get a PF of 1.0 with cheap switching power supplies, is to send them a square wave...

The challenge is a challenge. The goal is clearly to produce usable power, not to need more filtering. While the requirements for this contest don't require grid-tie, that's something that can be implemented later.

Submission + - Autonomous Sea-Robot Survives Massive Typhoon (itworld.com)

jfruh writes: Liquid Robotics and its Wave Glider line of autonomous seafaring robots became famous when Java inventor James Gosling left Google to join the company. Now one of its robots has passed an impressive real-world test, shrugging off a monster typhoon in the South China Sea that inflicted hundreds of millions of dollars of damage on the region.

Slashdot Top Deals

Any sufficiently advanced technology is indistinguishable from a rigged demo. - Andy Finkel, computer guy

Working...