Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Friendica and redmatrix (Score 1) 88

I have been happily using Friendica for a family network for a while. While quirky, it works, and has a bunch of stuff for interoperating with other sites including facebook and even using RSS feeds. In terms of privacy, development has moved on to redmatrix. The problem being that going to a truly privacy-oriented framework means interoperability is out.

But really it seems like the protocol and the software need to be separated so that different social networking software can interoperate. There is already some of this in friendica for protocols like identi.ca and others. Nominally redmatrix is still largely just a protocol: Zot, but the user interface is progressing.

Sad that neither of these are on this guy's list. I think the wikipedia page on open social networking services is more informative than this article.

Comment Re:Wikr (Score 1) 93

If you think this is secure against the FBI you are kidding yourself. Since it is a closed-source app, wickr has control of your private key and they only CHOOSE not to copy it off the device. They can simply be served with a NSL to pull that info from your device. Now if you're only trying to keep things private from criminals and corporations, you're probably good.

Comment Re:Elections are Popularity Contests (Score 2) 72

Yes the advantage of a multi-party system is that not every policy decision is a nuclear war for control. Parties will ally in different ways on different issues and therefore it is less likely that partisan bickering will hold up general function of government.

But it is perhaps a bigger problem currently the the loudest and most abrasive elements have almost complete control of the public dialog. This is not really a symptom of the two-party system, but of the prevalence and power of advertising-driven media. And, back on topic, data-mining-backed advertising with extensive personal information like facebook can do is frightening.

Comment Really a question of: Where did chondrules form? (Score 1) 26

The linked article is not really even an article, but I think the interesting science topic is that we don't understand where chondrules form. They are somehow formed in the early solar system by melting refrectory elements together. But how and where that melting occurs in not known (http://en.wikipedia.org/wiki/Chondrule#Formation.

It is thought that the formation might be related to dissipation of magnetic fields in the protoplanetary disk or the young sun (so-called magnetic reconnection) but it is not clear. I expect this study is trying to test this type of hypothesis by attempting to ascertain the magnetic field in which the chondrules were formed.

Note that this is NOT the magnetic field causing the formation of the solar system, as stated in the summary. I have no idea where the submitter or editor got that, as it is not in the (non-)article linked. Chondrule formation is a critical process for creating building blocks of planets, but it is pretty tricky to interpret that as the "cause of the formation of the solar system."

Comment Re:Window Dressing. (Score 1) 258

So, yes, some of us are a bit irked that the Great Hope passed a conservative health care reform bill.....

Then you are out of touch with reality, since trying to get single-payer through would have provoked a the same sort of overwhelming ad campaign from the insurance companies that it did in the 90s. And the american public is so easily manuplated by this sort of thing that nothing would have happened.

Comment Re:After Reading The Paper (Score 1) 136

But it probably is a problem if your opponent is a state-level actor. For example, China (and the US probably too) probably monitors connections to known tor entry/exit nodes. Given the attack mentioned, someone using tor in china is safe as long as the server being contacted is known to not be acting in concert with the adversary. However, if the server (or its connection to the tor entry/exit nodes) is also under control of the same adversary, then the connection can be de-anonymized. So this is a problem for chinese bloggers blogging on chinese blogs, but not so much on foreign blogs hosted outside china. Though it appears blog traffic would probably be too small to facilitate a successful attack.

Comment Re:Worthless degrees (Score 1) 438

As with another poster, I have learned a whole new meaning to rote memorization. Even in courses in the U.S. that are "just memorization and regurgitation" it is typically not literally word-for-word memorization and regurgitation. I thought that people meant that the tests would be the same problems as the homework, but I didn't imagine it could get to the point where the test was just memorizing and re-writing the solutions, with little regard for correctness. It's like a Brazil-esque caricature of the educational process.

Comment red matrix and zot (Score 2) 96

What about RedMatrix and its underlying protocol Zot? (This is what Friendica Red became.) Seems a shame that it isn't even mentioned. But most of the things on the list are oriented toward messaging, not more full-feature peer-to-peer sharing / networking. I think the only downside for Zot is the providor has the key. But you are free to be your own providor or choose one that you trust, and move if that relationship changes.

Comment Re:Paper Maps (Score 1) 236

Actually it's worse - GPS tells you where you are. If you want to go somewhere else, you might want to look at a map to see where the roads are. GPS makes it possible to have an effectively self-orienting map. How this implies that GPS replaces maps I have no idea.

Comment Re:Bang-bang control in action. (Score 2) 485

How about growing up instead of throwing a temper tantrum. Voting for conservatives because the progressives are not progressive enough is childish and stupid. There are plenty of democrats that don't like the NSA stuff either - most of the work in this area is done by the NCLU and EFF, which are not republican by a long shot - just vote and speak for more progressive democrats. Not against them! duh! (this is assuming you are not a shill paid to manipulate democrats into not turning out to vote. grrr)

Comment Re:Meh.... Here's the thing ..... (Score 1) 294

It's not that it would be logistically impossible. It would just be a waste of resources and a hindrance to the process of actually fighting the outbreak on the ground in west africa, which is far more important. This "travel ban is good common sense" stuff is just a political gamesmanship before an election. It's something that sounds good in a sound bite but actually makes things worse. But it is quite revealing about which politicians actually care about good policy for the public and which only care about their political careers.

Comment Re:This is silly (Score 1) 720

If you are retired and you didn't factor standard inflation into your plan then you didn't plan correctly. The usage of "a little inflation" is just humorously saying the normal target 2% inflation would be good. Low inflation is not good for the economy as a whole. Ironically one of the reasons inflation is necessary is to appropriately encourage workers to move from less productive (in terms of the overall economy) to more productive jobs because the wage for the less productive one doesn't keep up with inflation. But that assumes in either case the worker is being paid more than minimum wage.

Comment Re: New York (Score 1) 372

You are wrong. They were not following guidelines, though it is unclear that the appropriate guidelines were communicated well. (i.e. the people handling Duncan were clearly not properly trained).

Blaming the CDC when some Dallas hospital doesn't care enough about their staff to train them properly is stupid. And the CDC has changed policy. Active cases are now being transported to appropriate facilities instead of trusting that random regional hospitals know how to train their staff properly. (you make your own conclusions about mid-level health care from that.)

And that the administration is worried about political correctness is a complete strawman. They have said quite clearly that the problem with a travel ban or quarantine would be that it would make fighting the outbreak more difficult rather than better. The best chance here is to get the resources into west africa and stop the outbreak there. Travel bans and quarantines on non-symptomatic people only pointlessly waste resources to make you feel good about your ignorance.

Comment Re:Bennett Haselton on the Ebola outbreak (Score 1, Insightful) 372

Sorry but you are wrong. Ebola is not transmissible until the patient is symptomatic. So, for example, NOBODY outside the hospital caught ebola from Eric Duncan. It has been more than 21 days since he went in. This is a done deal.

And if we could detect the virus before symptoms set in, then we wouldn't need to monitor for symptoms, we could just test them and be done with it. DUH! Duncan's family in Dallas were "quarantined" because they couldn't bother to make themselves available for someone to take their temperature twice a day (talk about sad). And others have been quarantined because the public is freaked out, not for any medical reason. People being monitored shouldn't travel mostly because if they become symptomatic they may not be in a convenient place to get into quarantine from there.

Comment Re:Call it what you will (Score 1) 329

While I tend to agree, I think is some more subtlety. In its original conception, CGI probably did consider the web inputs as essentially session-level data, which would warrant what you refer to as "semi-persistant" storage in the environment. I would say that web programming has evolved some in modern usage, and a transient-data model as you suggest is probably more appropriate.

But there is plenty of blame to go around. Bash, or anything else for that matter, should not interpret otherwise completely unused environment data in such a way that it gets executed. There are plenty of other contexts outside CGI where that is a problem. Environmental variables are a well-established way for communicating data from parent to children processes. One that is, sometimes conveniently, agnostic about whether that data is intended for or a direct child or the child of a child. But if a program is performing some function based on the content of *any* environmental variable rather than the content of a specific variable or variables, that is likely to cause trouble.

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...