Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:OpenID? (Score 1) 202

Most of the problems you raise are pretty trivially solved by remembering that it's the government talking about this. AT&T tries to keep your identity to impersonate you? The government can lock AT&T out of the system, or fine the crap out of them, or whatever sanction they want. This actually reminds me somewhat of the records provisions of HIPAA, which are actually pretty good about making sure records are used properly and are given to the people who are supposed to have them (too bad they're all a bunch of incoherent sheafs of paper).

Comment WHY (Score 1) 370

'Most people who illegally download movies, music and TV shows would pay for them if there was a cheap and legal service as convenient as file-sharing tools like BitTorrent.'

If only someone would create an online service which allowed you to buy music! What kind of twisted mockery of a universe do we live in that has kept this from happening?

Why must the universe mock us so?! WHY?!

(For reference, it is raining behind me, and I am wet. The two are not related.)

Comment Could be worse (Score 2, Funny) 449

Yesterday I needed to boot into windows (the D&DI Character Generator doesn't work in wine, as far as I can tell), and I was greeted after boot with a lovely screen telling me that the system was broken and in need of repair. So my two options were restore from backup or repair. I had no backup, so I went to repair, and under "select drive," there was no system install. Windows had apparently uninstalled itself.

I'm still trying to sort out what happened.

Businesses

Bridging the Digital Divide In Uganda, By Freight 146

jtrust27 writes "Slow or non-existent Internet connections have meant that the people of Uganda have not been able to harness the many advantages of the online economy. This social and economic exclusion of the poorest of the poor was further accentuated by the impossibility for a Ugandan to obtain a credit card or make PayPal payments — a simple requirement to be able to pay for goods and services online. Most merchants and payment gateway providers automatically block all credit cards from Africa, and it is not possible to get a verified PayPal account in many African nations." Now, a Ugandan company called EasyPayUganda is helping people sidestep these restrictions, by allowing customers to make online payments by proxy in order to pay for services and goods. EasyPayUganda is also providing a logistics solution, forwarding customers' shipments to Uganda, as most online merchants will not ship to Africa.

Comment Re:Simple Solution (Score 1) 530

First, he absolutely hijacked it. It doesn't matter that he was the only admin and nobody else "needed" (even allowing this rather hefty value judgment) access. It was their system. He built it for them. They got rid of him, and he decided that he wasn't going to let them have a thing that was theirs by right. If this was a corporation, he'd be sued six ways to sunday. Since it's the government, they're talking about jail.

Your point about exiting angrily and recommendations is completely irrelevant. Exiting gracefully -- handing over access -- would have 100% avoided the situation he is now in. How anyone thinks he is the good guy in this situation is beyond me, but I guess it's just nerd bias.

Comment Simple Solution (Score 1) 530

"They will return Tuesday to start their deliberations. Childs faces five years in prison if he is convicted for disrupting service to the city's computer system by withholding administrative passwords — a verdict that, if rendered, puts all IT admins in danger."

This is true, this puts all IT admins who exit their job angrily, hijack the system and lock everyone else out in danger.

I mean, who hasn't been there, right? I mean, one could just leave the job gracefully but something something something freedom.

Input Devices

Life Recorder 347

Bruce Schneier writes "In 2006, writing about future threats on privacy, I described a life recorder: A 'life recorder' you can wear on your lapel that constantly records is still a few generations off: 200 gigabytes/year for audio and 700 gigabytes/year for video. It'll be sold as a security device, so that no one can attack you without being recorded."

Comment l2federalism (Score 1) 172

"ruling from the New Jersey Supreme Court ... is likely to set precedent for other workplace privacy cases around the country."

No, it's likely (100% likely, in fact!) to set precedent for other workplace privacy cases in New Jersey. For the rest of the country, it sets nothing, even if it might be useful for other courts dealing with similar problems.

Unless, of course, poster is just being ridiculous optimistic and think that the logic of this ruling is so impressive that all other judges will simply bow in awe and follow it. To which the only response is: d'awwwwww.

Comment What's Their Motivation? (Score 5, Interesting) 518

Why should devs adopt DX11? Because the last iteration of DX lasted about a year and a half before being ditched and extended/redone? Because the majority of the market doesn't have DX11 cards? Because there's no clear advantage in developing to DX11 rather than DX9c?

Why should developers shift from something they know to something that they don't know as well unless there was significant profit motive to do so? There simply isn't in this case.

Comment A by-the-numbers affair with no shenanigans (Score 2, Funny) 64

"InfoWorld's Galen Gruman sifts through the 'doubleplus ungood' of this year's CTIA and Mobile World Congress to spell out 'Big Brother' mobile carriers' true designs for IT and smartphone users."

This sentence does a good job of informing the reader that article in question is an insightful and objective look at new mobile telecom strategies.

Patents

Tridgell Recommends Reading Software Patents 173

H4x0r Jim Duggan writes "Andrew Tridgell rejected the common fears about triple damages: 'If you've got one lot of damages for patent infringement, what would happen to the project? It's dead. If it gets three lots of damages for patent infringement, what happens to the project? It's still dead.' Tridge then explains the right way to read a patent and build a legal defense: 'That first type of defence is really the one you want, it's called: non-infringement. And that is: "we don't do that. The patent says X, we don't do X, therefore go away, sue someone else, it's not relevant for us." That's the defence you want. [...] Next one, prior art: [...] Basically the argument is: somebody else did that before. It's a very, very tricky argument to get right. Extremely tricky, and it is the most common argument bandied about in the free software community. And if you see it in the primary defence against a patent, you should cringe because it is an extremely unsafe way of doing things.' There are even some tips in the talk specifically for Slashdotters."
Crime

Killer Convicted, Using Dog DNA Database 97

lee1 writes "It turns out that the UK has a DNA database — for dogs. And this database was recently used to apprehend a South London gang member who used his dog to catch a 16-year-old rival and hold him while he stabbed him to death. The dog was also accidentally stabbed, and left blood at the scene. The creation of human DNA databases has led to widespread debates on privacy; but what about the collation of DNA from dogs or other animals?"

Slashdot Top Deals

Things are not as simple as they seems at first. - Edward Thorp

Working...