Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment zero-sum? (Score 3, Insightful) 1098

RMS's philosophy assumes a zero-sum combative environment for software: "free and uncapitalizable" vs "open-source and capitlistic". He's consistent and clear, but this zero-sum assumption is false. Closed-source innovations have cross-bred with open many times, either via concept or actual code contributions. The ecosystem mingles every time any coder merges their closed-source ideas with open or vice-versa. Freedom in this case lives at the meta level that allows individuals AND a market to thrive. We're not going back to an age where all the drawers of tapes are unlocked for everyone at all times, but where the concepts embedded in the tapes' content crossbreed and multiply. Freedom has thus encompassed RMS's idea (after all, GPLv3 is not prohibited) and that of a market-based economy. His stance that assumes zero-sum reveals a clear dislike for the existance of the market, which perhaps arose from a time when digital commerce could not be envisioned. However, digital-goods are indeed a very large market and that work to create such goods will come from anywhere, free, paid, donated and even (regrettably) stolen. It mirrors the real world, as it should.

Comment Why these programs were built (Score 1) 572

Ostensibly, the NSA's recording and then subsequent unpacking of all communications is to help prevent terrorist attacks. If they never reveal how these helped, truthfully not helping any investigation, or just to avoid showing their hand to suspected terrorists in a courtroom - the same paradox arises: The "terrorists" are part of the population that demands freedom from tracking. In other word, they are hiding among the populace.

The question we may all want to face is if a terrorist bomb takes out a bus with our family on it, would any amount of NSA tracking be acceptable? If the attack was instead thwarted via a program that was never, ever revealed (officers just magically knew about a plot), we'd be exactly in the current situation. So I find it difficult to accept that I know the truth about this situation still.

I don't trust the NSA - not so much about the snooping on general citizens, but that their program won't be used to find critical journalists, political opponents, budgetary critics, and perform a scientology-style smearing of their character. If they detect a bunch of would-be terrorists via web usage, TOR hacks, phone snooping, I would have to just go along with it: so far, no representative or candidate of my district is ready to stop any of these programs, although I've writen them about how we can put checks and balances into the programs.

If theoretically the NSA could know about *everything, everywhere* - would this be beyond some personal limit? What is the limit of what a police program should track about the citizenry?

Comment Re:The Group of 4? (Score 4, Insightful) 109

While I don't completely disagree with you, "good code" seems to imply a judgement based on some values. In enterprise systems, the transferability, maintainability and self-documenting concepts in code can play as much a role as footprint, security and speed. Not all systems are dancing on the edge of "too big" or "too slow" - they are closer to failure because of "poorly defined", "too fragile" and/or "too esoteric".
A company may want to keep modules in plainspeak, well-documented and slower .NET componentized form because they burn through developers every 2 years, like the industry avg. If your job stops as "stable and secure" you may not really be contributing to a software system portfolio like a large company needs.

Comment A bit obtuse (Score 4, Insightful) 109

It's entertaining, typically weird article from Bell. They're a bit snarky but somewhat long-winded - his penchant to build classifications of things overrides any real deep-dive into what he's talking about. And his daughter appears in every article, I'm surprised there isn't a "17 types of annoying child" article yet.

His other complaints: UML, XML, Agile misuse/overuse - each with an article, blog post that has invented classifications.
Where's the one on "taxonomy joke" overuse?

Comment Re:About time (Score 3) 345

While I don't (yet) believe the NSA is blackmailing the rest of the government to obey its wishes, I don't think they are "going to be stopped" in any meaningful way. Instead, I think we're going to pick ever-more-hair-splitting rules for technology's use in policing. The reason effect is that they'll just go underground for a bit.

Comment What is the Limit (Score 3, Interesting) 345

If not this phase of technology used for National Security, there will be some other. In any case, what level of technology use by the government is safe or allowed? I suspect this issue/case is just one of a myriad of ongoing decisions to balance the use of technology for crime/safety while letting everyone (at least) feel like their privacy is respected.

[it doesn't take much to envision a stability to just-appearing technology so that they become applicable in many potentially intrusive ways...drones hovering above public places using instant facial recognition to identify any person-of-interest, without need to publish why interest arose...infra-red cameras on streetlights to track who is in each home and when...ubiquitous vehicle-tracking, engine-disabling technology to capture any suspect in a vehicle...100% person-presence tracking]

The technology is going to be everywhere, and it's understanding by the general populace is shrinking. The technocrats will provide the tools for the aristocrats and both will try to balance between appeasement and revolution by the rest of society. Choosing to avoid technology now will only handicap you. Some as-yet-unknown sci-fi authors will be heralded as prophets.

Hardware

The Real Story of Hacking Together the Commodore C128 179

szczys writes "Bil Herd was the designer and hardware lead for the Commodore C128. He reminisces about the herculean effort his team took on in order to bring the hardware to market in just five months. At the time the company had the resources to roll their own silicon (that's right, custom chips!) but this also meant that for three of those five months they didn't actually have the integrated circuits the computer was based on."

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...