Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Update on this story (Score 1) 377

I think the number you want is the "Illicit Drug Use in Lifetime" for people 18 and over. This table (part of a much larger report) gives the number as 49.3% in 2009, so not quite 50% (although if you scroll up to Table 1.11B, you can see that people 60 and above are pulling the average below 50%).

I am not really sure where to look for data on ill effects or even exactly how you would quantify them, but the same study does make some attempt to do so. For example this table shows (past year, not lifetime) rates of dependence and abuse for both illicit drugs and alcohol.

Comment Re:Make up his mind, please (Score 4, Interesting) 520

Since Facebook users volunteer up the information that pretty much makes it public information.

Okay, so if I post information on Facebook (either editing my profile or posting a status) then I am voluntarily giving that information to Facebook, so that makes it public information? Even though I expect only people I have marked as friends to see such information by my privacy settings? What if I send a Facebook message? It has a clear "To" header like an e-mail; should that information be considered public? For that matter what about GMail? I am inputting information into a textbox on a website with the intent that (specific) other people will read that text. Should I therefore treat that text as public knowledge? For a physical analogue, suppose I write my text on paper (perhaps multiple copies) and put those pieces of paper into envelopes and send them to my friends via snail mail. I, once again, have written text and tendered it to a third-party for delivery to a specific set of private individuals. Should I still expect this text to be public?

The United States has laws about privacy and due process. New technology should not make it so the government no longer has to follow due process in collecting private information on its citizens. Unfortunately, due to the nature of network effects, a lot of information gets concentrated in the hands of a few entities (in this case, Facebook) who do not necessarily have much interest in dealing with the government, so they simply freely hand over the information. I suppose privacy laws could be written to make it illegal for Facebook to hand over information about its users to the government, but it is not clear what such laws would even look like nor who would be supporting them.

Seriously, I don't care if you know that I'm at the book store buying a coffee. If I don't want this information to be public I don't post it. Problem solved.

You are right that a lot of this information actually is not that important. At the same time, I do not like the idea that law enforcement personnel can peer into my private life as recorded by various services I use without even having to justify the invasion of my privacy to a judge.

Of course, see my sig: I dislike the idea of monolithic services that are able to collect such information and would prefer that social networking (and other) services be made up of collections of smaller separately administered nodes, each of which would have far less information. How to do that while still having a usable service is, unfortunately, an open problem.

Comment Re:I have a solution!!!! (Score 2) 128

The reasoning is that the vast majority of the time, no one is doing a man-in-the-middle attack and furthermore that doing a man-in-the-middle attack on any significant proportion of the connections on the internet is assumed to be above the capabilities of any known attacker, so it means that you are probably talking to the owner of the DNS entry and normal passive sniffing attacks (ex. Firesheep) won't work. Also, the attacker may not be able to tell which connections are verified and which ones aren't (especially if the browser assumes self-signed sites will always use the same certificate until it expires), so even man-in-the-middle attacks on self-signed certs are non-trivial.

Also, the information being protected is generally assumed to be relatively low value, so protecting it with a relatively easy to break security layer is not a large problem: after all, it is currently being sent unencrypted.

Of course, hopefully verifying certificates via DNSSEC will be supported soon, which will make the entire self-signed certificates argument moot. (Err... well, eventually, once it is widely deployed.)

Comment Re:Correlation is not causation (Score 1) 490

My high school gave an unweighted GPA as you describe but also a QPA ("Quality Point Average") score that was weighted by the level of course. Other people I have talked to have mentioned weighted GPA systems that offer a similar correction. Of course, the best way to maximize QPA/weighted GPA may still not have been to get As in the most challenging courses, but such a system at least makes an attempt in that direction.

Submission + - ESP-Based forwarding brings faster internet

An anonymous reader writes: RFC 5984 was published today by IETF, describing ESP-based forwarding as a way of reaching zero-latency, infinite bandwidth internet access. The author writes on his blog: "½ÂI am very happy that our hard work has been recognized by the internet community. We have laid the foundation for ESP-Based forwarding and are looking forward to see more implementations of this concept. Perhaps this is a small step for man, but it is a giant leap for ping"

Submission + - Ubuntu 11.04 beta (ubuntu.com)

An anonymous reader writes: Ubuntu has released a public beta for 11.04. It should be noted that installing this with WUBI has been discouraged. The beta can be found here: http://www.ubuntu.com/testing

In addition to this beta, they have confirmed that the netbook & desktop editions are no more. They have been merged into one and simply called "Ubuntu". Also Ubuntu Server Edition is just called Ubuntu Server, without the "Edition".

Some highlights include updates to the kernal, Unity, LibreOffice, Ubuntu Software Centre and the brand new Firefox 4.

Google

Submission + - Will Google's "Social Voting" Kill SEO? (gogarraty.com)

An anonymous reader writes: Yesterday, Google unveiled their new "Google +" feature, which will allow internet users to rate webpages with a "+1" in much the same way users can "Like" something on Facebook. Although the feature is brand new (hardly a day old), it promises to revolutionize the way we view Search Engine Optimization and website ranking.
Intel

Submission + - Dual-core Sandy Bridge CPUs go mobile (techreport.com)

crookedvulture writes: Dual-core versions of Intel's latest Sandy Bridge CPUs have started popping up in notebooks as cheap as $625. The Tech Report takes a closer look at one such laptop, comparing its performance to a host of desktop CPUs, a quad-core Sandy Bridge notebook, plus a stack of other mobile systems. The dually's performance is impressive, and it doesn't come at the expense of battery life. Particularly surprising is the fact that the CPU's integrated graphics processor can handle recent games like Bulletstorm. The onboard GPU in mobile Sandy Bridge variants is actually faster than what you get on the desktop.
Medicine

Submission + - FDA to Allow Production of Generic Preterm Baby Rx (washingtonpost.com)

AndyAndyAndyAndy writes: "In February, the FDA sent many groups into revolt with the approval of a long-standing generic drug to a a sole pharmaceutical company under the trade name Makena. The widely used generic alternative was thereby disallowed (for 7 years), increasing average price-per-dose from $15 to $1,500. The average number of doses-per-pregnancy is 20.

Now, the FDA has announced that it will not pursue enforcement against pharmacies that continue to produce the generic compound. Many laud this situation-specific exemption as a success for pregnant families, especially those who cannot afford this crucial drug, but what kinds of implications might it have on the development of "longshot" drugs — ones which may cost a great deal to develop and not be necessarily affordable for the consumer?"

Businesses

Submission + - Cable-backed anti-muni broadband bill advances in 1

suraj.sun writes: Cable-backed anti-muni broadband bill advances in North Carolina:

The North Carolina bill called the "Level Playing Field/Local Gov't Competition" act, intended to "protect jobs and investment by regulating local government competition", H129, passed the state's House of Representatives on Monday 81 to 37. Opponents call it just the opposite--cable industry-backed proposal intended to make it almost impossible for cities to build their own broadband networks.

Bill's sponsor, Marilyn Avila (R-Wake), told WRAL TV that the legislation would protect businesses from "predatory" local governments that want to build their own ISPs. Baloney, responded Rep. Bill Faison (D-Orange). The law will "make it practically impossible" for cities to provide a "fundamental service," he insisted. "Let's be clear about whose bill this is, this is Time Warner's bill."

ars technica: http://arstechnica.com/tech-policy/news/2011/03/cable-backed-anti-muni-broadband-bill-advances-in-north-carolina.ars

Submission + - Robert Bunsen - An Open Source Pioneer? (chemteam.info)

cygtoad writes: Today Celebrates Robert Bunsen's 200th Birthday. I found this interesting factoid on the man: Bunsen and Desaga did not apply for patent protection on their burner and it was quite soon that others began to produce their own versions. Some even went so far as to claim the invention as their own, including one person who was granted a patent on the device. Both Bunsen and Desaga were involved in writing letters to the proper authorities to refute these claims. Does anyone have an older example of such an open information pioneer? In my book he deserves some honor.
Security

Submission + - DNSSEC Finally Arrives for .Com TLDs (securityweek.com)

wiredmikey writes: major milestone for DNSSEC has been reached today, as this morning DNSSEC has been officially been signed for the .Com TLD. Following several other Top Level Domains already supporting DNSSEC, the added level of security can now be enabled on for the more than 80 million .Com names which have been registered according to VeriSign, the operator of .com.

DNSSEC is designed to protect the Domain Name System from authentication exploits, primarily cache poisoning which can allow internet requests to be intercepted, allowing an attacker to access a website, e-mail, or other services, and redirect or spy on the users without their knowledge.

But the technology community seems to still have many questions about DNSSEC, and lack understanding of even the basics of it. According to a very recent study of internal and external IT personnel in charge of Internet security at the world’s largest organizations, half of the respondents either hadn’t heard of DNSSEC or expressed limited familiarity with it.

Slashdot Top Deals

To thine own self be true. (If not that, at least make some money.)

Working...