Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Require cameras (Score 1) 671

If he "requires" that and consents, the trial will be held behind closed doors without the promised cameras

Then he's just proven to the world that the USA is not to be trusted.

If he can safely stay in Russia, he'd be well-advised to do so. If not, it would still be better to try to disappear to some other place. Going to the US, no matter the promises, is suicidal.

If it were me, that's what I'd do, but I'd lay low and stay out of the news.

Comment Re:Simple solution... (Score 1) 95

How about just tell them to be in the room when you do the standup? This solution is simple and costs absolutely nothing.

Unless your employees live in the same building as your office, there's a non-zero cost to having everyone in the office for meetings. At my office, even though employees are all "local", depending on traffic it can take up to 2 hours for some of them to get to the office.

Comment Re:The corporate solution (Score 2) 95

Pretty much every company ever has already solved this problem with polycom (or similar) conferencing phones(ranging from a few hundred dollars on up)

http://www.polycom.com/product...

Also conference phone numbers like Webex at all so lots of people can call in, if you need that sort of thing.

This is not a new or unsolvable problem, this is "standard office gear" since the 1990s.

Exactly, we have a 30 seat conference room with a polycom and 2 extension mikes. For company meetings, remote employees dial-in to the conference bridge, and the phone works surprisingly well, everyone in the room can be heard. (it does get confused though when more than one person speaks at once -- it doesn't know which microphone to use, so the two voices fade in and out)

No need to ditch working solutions just because they are "old school" -- most of our remote users use some VOIP solution to reach the conference bridge (google hangouts, skype, etc)

Comment Re:"require"? pffft (Score 1) 671

Snowden has no bargaining power. Nobody can trust any agreement he offers to make - the crime he committed was breaching an oath. Plus, he has repeatedly said that he no longer has the information he stole in his possession.

Once he's in custody, it's physically impossible for him to refuse to accept the results of a "fair trial".

Comment Require cameras (Score 5, Interesting) 671

As part of his re-patriation agreement, he should require cameras to be rolling throughout the entire trial with a live uncensored feed available to any organization that wants it (News organizations, EFF, ACLU, etc). If the government shuts down the cameras for any reason, then the agreement is null and void and the USA guarantees his return to Russia.

Then the american people can decide if the trial is "fair" -- if the government tries to redact all of the evidence due to national security reasons, then it's hard to see how the trial can be called "fair".

I realize that the USA will likely ignore the agreement once he's on american soil, but at least it demonstrates that the USA government can't be trusted to abide by its own agreements and it validates Snowden's reason for fleeing to Russia.

Comment Why trust users to do it? (Score 3, Insightful) 564

Why trust users to know what file extensions are "safe" and which are not? Surely the same computer that shows "ImportantFile.doc" to the user when it's really "ImportantFile.doc.exe" can be smart enough to pop up a message when someone clicks on it: "Hey, this filename *looks* like a document, but it's really an executable so instead of opening a document, I'm going to run it. It's probably a terrible idea to run it, so I'm not going to do it, you'll have to rename it to something less ambiguous if you really want to run it. But you should't do that. Really. I'm not kidding."

Comment Re:I never understood why (Score 1) 564

I never understood why Windows hides file extensions by default. Doing so makes Windows much more difficult to use. Changing that setting is literally the first thing I do with Windows. Hiding file extensions was one of the worst decisions made for Windows.

The people that find visible file extensions to be useful are the same people that know how to change the default setting to show them -- for the rest of the world, file extensions are meaningless, they'd rather see the MS Excel icon on Excel Docs than have to remember what file extensions will open into an Excel doc.

Comment Re:1.2 what? (Score 4, Funny) 199

1.2 pedobytes.

According to the article, they seized more than 4 times more child porn than the Library of Congress has.

But unlike past investigations into the distribution of child porn, which typically involve targeting suspects individually, police have instead seized over 1.2 petabytes of data—more than four times the amount of data in the US Library of Congress

I'm kind of surprised that all congress could only manage to accumulate 300TB of child porn.

Comment How big is it? (Score 1) 93

The summary says "Reads and large writes run at about the same speed as on a conventional drive, and at $280 it costs less than a pair of decent 4TB drives", one of the 7 links in the summary mentions a 5TB model. 5TB for the price of two 4TB drives doesn't sound that great.

Comment Stingray detector? (Score 4, Interesting) 194

So I wonder if all of this excess interference means that a Stingray detector could be created? Privacy minded volunteers could run a SDR that looks for an increase in the noise floor or other indications that a Stingray is in use, and update a central repository for a real-time map of everywhere a Stingray is in use.

If Law Enforcement won't reveal when they are using it, maybe citizens can find out out their own.

Comment Re:Wasteful? (Score 1) 95

Well, to quote the summary: "Ikea's introduction of wireless charging functionality on some of its new furniture heats up the battle for a global wireless charging standard"

Although you can get up into the 80% range (short distance between emitter and receiver, good axial alignment, well-tuned resonance frequencies, and proper shielding), you are more likely to be in the 50-75% efficiency range. That's for the inductive portion; there is also a loss in converting the 120/220V power from the wall. [I speak from professional experience developing a Qi-charged medical device. It was a good solution for the problem, as it allowed the case to be fully sealed, but turned me off the idea of using it for everything that needs charging.] For 5-10 W of actual charge power in the device, your losses from grid to device will be close to that amount This is about as bad as the 50-60 Hz wall wart transformers that we have recently gotten away from.

My phone battery has around 8 watt-hours of capacity. Round it up to 10 watt-hours, and that's around 3.6KWh/year to charge my phone every day, so even if I'm wasting another 3.6KWh/year, that's only costing me around 50 cents/year of electricity, which is well worth the convenience of just putting my phone on the side table when I go to bed and not having to fumble with wires in the dark to connect it to a charger.

Comment Re:Obligatory (Score 1) 95

Can anyone explain to me the appeal of xkcd comics? A lot of people think they're great, but I don't see why.

The joke is never funny if someone has to explain it to you, you'll just have to continue going through life wondering why people find it funny. And some people will never understand what *you* think is funny.

Comment Re:Uninsightful (Score 1) 253

A "maser" attack??
I do not think that work means what you think it means.
While you are looking up "maser" look up "Dunning -Kruger" as well.
The opposite of "insightful" :(

I looked up maser as you suggested, and one of the uses of a maser is: Masers are being used by a few countries as directed-energy weapons. So what do you think "maser" means? Oh wait, I get it, you are the one suffering from the Dunning-Kruger effect. Clever.

Comment Re:this is one more reason (Score 3, Insightful) 136

Nobody is stopping people in the US from doing business with mega. Send an international money order. People do it all the time. And if you trust them so much, you can always send cash.

It's not so much trust in the business on the other end that keeps me from sending cash through the mail, it's all the people in the middle that are handling the cash-filled mail. The business has a huge incentive to not rip off their customers since a customer that doesn't get what he paid for will soon be an ex-customer.

If postal workers knew that every envelope addressed to Mega had cash in it, they'd be a huge theft target.

Comment Re:Just a distraction from the real fail... (Score 1) 47

Because they think it was a crime of opportunity, which sounds like a reasonable supposition -- the hacker stumbled across the key in Github, then either gave (or sold) the key to someone else to do the hack, or did the hack himself. Clearly he wouldn't have downloaded the data using his own IP address, but it's entirely possible that when he found the key on Github, he was using a traceable IP.

There could be hundreds of legitimate accesses of that file. If the hacker was indeed using a hidden IP address to access the database, but his real IP to download the gist, how are Uber going to determine that from all the other legitimate accesses? If the hacker gave away or sold that information, there is going to be no way for Uber to determine a link at all. This just seems like a fishing expedition to hide the real fail.

Or there could be 2 accesses of that file, depending on how long they left it up there. Right now, only Github knows how many people accessed it.

By admitting that one of their developers leaked the key himself on Github, it seems a little late for them to claim that they have no responsibility for the breach.

Ahh... but the thing is that Uber haven't admitted to anything like that. By serving a subpoena against GitHub, it is clear that is what has happened, but nowhere have I seen Uber actually admit this. If Uber were actually to admit this, it would likely open them up to lawsuits from their affected drivers.

They provided the exact Gist URL that had the information, if the drivers want to sue, they can subpoena Github themselves.

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...