Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Accepted capping, and paid for a suitable limit (Score 1) 353

... with the possibility of increasing the cap if needed.

I am in the UK and wanted to move to an ISP which offered FTTC, IPv6, a static IP, would be happy for me to run servers and would not implement CG-NAT, and offered good technical support in the event I should need it. The ISP which was most highly recommended to me based on those criteria offered FTTC for a fixed monthly price, with a cap — if paying a proportionate more-than-average-in-the-consumer-market price gave me a proportionate more-than-average-in-the-consumer-market service, that sounded like a good trade-off to me, even with a cap.

Coming from an uncapped connection, I was nervous about buying something with a cap, but, having checked our usage for a three month period, I picked the option with a cap three times that (guessing that a faster connection would mean we use it for me) and, so far, that has worked out well for me. If I want another 100GB, I can pay for that, either as a one-off, on a particularly heavy usage month, or to upgrade the connection permanently.

(The ISP is Andrews and Arnold and, so far, I have been more than happy with them. I guess that they have to pay upstream for capacity, and an unlimited connection would entail a pretty significant premium to ensure that they were not left out of pocket.)

Comment BlockSite (for Firefox) worked for me (Score 2) 125

I realised I was wasting far too much time on Facebook a couple of years ago, along with other forums, and found it hard not to browse there - often, I found that I was just typing the URL without thinking about it, and loading the site without giving it any thought. A friend recommended BlockSite to me, and, whilst I felt a bit stupid at needing this crutch, I took it, and managed to get things back under control.

Just add in the URLs of the site in question, and it blocks access to the pages (and elements at those URLs from loading as part of other pages). Editing a hosts file is probably just as suitable, but this worked for me...

Comment Re:Presentations... (Score 1) 234

Unless you are installing a production system in front of a room of people, and then not changing the password afterwards, just carry on as usual:

Maintainers of the Anaconda installer in Fedora have taken it upon themselves to show passwords in plaintext on the screen as they are entered into the installer

Comment Re:Thank god the iPod is dead (Score 1) 184

For those of us who used platforms that it didn't work on, it made owning an iPod/iPhone a nightmare

I used my old iPod with Amarok under Ubuntu for quite some time — I actually found it easier to use that iTunes on Windows, which, for me, crashed more often than it worked.

Comment Re:Relevant amendments: (Score 1) 58

once your name, phone number, profile picture and other identifying data is stripped, they can do whatever they want with your data?

If all other identifying data has been stripped away, it is really "your" data any longer?

I'm not sure that the situation you describe here would protect the data under the existing rules either:

(a) 'personal data' shall mean any information relating to an identified or identifiable natural person ('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;

I think there is a difference between the situation which you describe (which seems to be anonymous data) and pseudonymous data, though, in that pseudonymous data does not have all identifying data stripped out, but rather replaced by a less obvious identifier.

The phone number 07700 900771 might become a2t6#g1, but, if, in a stream / sequence of data, that number always becomes that alternative descriptor, anyone in control of the algorithm / key could convert obtain the original number again with relative easy — just run all possible permutations of the phone number (which is of standard form, with specified structure) through the algorithm and pattern match.

To my mind, provided that the algorithm doing the conversion is appropriately protected, pseudonymisation may be one good method of reducing the risk associated with the processing of personal data, protecting it in the event for a data breach, and thus be a form of security measure, but is unlikely to stop the data from being capable of identifying the individual, in the hands of the party carrying out the pseudonymisation.

Space

Residents Report Bright Streak Over Bay Area Friday Evening 123

The Chabot Space and Science Center has received numerous reports of a bright object flying through the sky in over northern California Friday night, as noted by The Washington Post, NBC, and others. According to NBC's version of the story "Chabot astronomers in Oakland said the meteor was not related to the asteroid passing near Earth. Gerald McKeegan, an astronomer at Chabot Space and Science Center in Oakland, said he did not see it, but based on accounts he thinks it was a 'sporadic meteor.' Sporadic meteors bring as much as 15,000 tons of space debris to Earth each year, according to McKeegan. He said it was likely smaller than another meteor that landed in the Bay Area in October, which caused a loud sonic boom as it fell." The eyewitness accounts make it sound pretty spectacular, though; too bad we don't have quite as many dashcams going as there are in Russia.

Comment "Secret" as in "well signposted"? (Score 4, Informative) 101

The AWE plant at Aldermaston is well signed from the road, and its website seems at least reasonably open about what it does:

Our role at AWE is to manufacture and sustain the warheads for the Trident system ... Our work at AWE covers the entire life cycle of nuclear warheads; from initial concept, assessment and design, through to component manufacture and assembly, in-service support, and finally decommissioning and disposal.

Comment Re:There is no compulsion on Rennard... (Score 1) 57

He can opt to pack all his employees and leave, without risking their lives.

Absolutely. Indeed, as he is quoted in the article:

Firstly, we have to protect our 2,000 employees in this region ... You just have to be able to protect your people in the country."

The article goes on to ask whether Orange has a corporate responsibility to keep communications running in situations such as this, and Rennard replies:

“In the end, I decided to send just three members of staff back, because if the network goes down, the public will ask, where were you when we needed you? But if I send these three guys back, and one of them is killed, that is on my conscience and I have to live with that. It’s not an easy decision to make, but this is my job.”

Comment Re:Missing the point. (Score 1) 134

It's a long read, but most of the important points are made in the first page. The rest (sadly) qualifies for TL;DR - it simply rehashes and expands on the same ideas from different angles and in more depth.

It sounds like your neat summary of the article might also describe the difference between "social" games and "regular" games.

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...