Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment If it's on Twitter, it's public (Score 1) 166

Not playing devil's advocate or anything, this is an interesting idea. In the same way that "customer sentiment" is gauged with this kind of tool, it may be in schools best interest to have their students' twitter and FB accounts tracked. What's private remains private if the user wants to, but if the student is writing in public "I'm feeling a bit suicidal" everyday on FB and Twitter and the school is only notified when there's a body at the bottom of a stairwell, then they might realise "oh I wish we knew what was going on".

Comment Missing the point here (Score 1) 189

The endless discussion on the advantages of analog over digital recording always gloss over the fact that a customer has to pay $10-20 for EACH album purchased in the vinyl analog format, while a $10-$20 64Gb SD card stores 1200 albums (@12 songs; @ 5Mb per song in 256BPS MP3 format) for the same price. Plus 1200 albums fills the wall of a house and weighs 100+ kilos, while a 64GB SD card is the size of a thumbnail.

The question of preserving sound quality on different media is like being concerned that a Mozart symphony would disappear if the paper that Mozart himself wrote the symphony on crumbled. Instead we just get a new symphony orchestra to play the same notes that Mozart wrote down with the same instruments. And the symphony sounds the same 250 years later without using any recording technology.

It's the musical experience that is important, not the recording of the musical experience.

Comment Filthy business practices (Score 3, Insightful) 198

I am not a huge fan of Google and what SEO/advertising has done to the www, but I have to say that these guys are in the wrong. Sabotaging the competitor and demanding "protection money" is not fair competition IMHO. I want my ISP to be a carrier, not a curator or a gatekeeper. I have Adblock and I know how to use it, thank you very much.

Comment Re:Why do companies keep thinking people *want* th (Score 1) 125

I don't want "convergence" between my devices. Why would anyone?

because there's a lot of people out there with their own views and needs that may not match yours?

Look at office-type tasks on a tablet. People like the idea of turning the tablet on and off instantly, but dislike having to spend extra on a normal PC to get SSDs and still fall short of that kind of performance.

The applications built for mobile are smaller and optimised for fewer tasks on a device that is less likely to require maintenance, with OS that is updated by someone else.It makes a lot of sense to want to get from this situation from one where people benefit from better ways of using PCs, while retaining the nice things about traditional PCs (like keyboards and big screens!).

Comment surprise... disbelief (Score 1) 58

Microsoft Corp. is evaluating a bid for Salesforce.com Inc., after the cloud software provider was approached by another would-be buyer, people with knowledge of the matter said.

I wasn't expecting this kind of acquisition news even if I work for n the MS Dynamics field, but then again, the Blomberg piece is written in such a way that they can't he wrong no matter what happens next.

The Dynamics CRM product/SaaS has improved a lot in the last few releases,I'd be sad to see MS lose focus on its development by having to fit a direct competitor in the product family. While in the early 2000s the Navision acquisition brought 3 products with some overlap and life moved on, I get the impression that working with sfdc would be different, especially because this company has seen and positioned themselves as anti Microsoft and as an ally of whoever could disrupt the MS Office dominance.

Comment No, they are categorically NOT doing that... (Score -1) 164

...and your comment represents the absolutely fundamental misunderstanding that pervades this discussion.

The truth no one wants to hear:

The distinction is no longer the technology or the place, but the person(s) using a capability: the target. In a free society based on the rule of law, it is not the technological capability to do a thing, but the law, that is paramount.

Gone are the days where the US targeted foreign communications on distant shores, or cracked codes used only by our enemies. No one would have questioned the legitimacy of the US and its allies breaking the German or Japanese codes or exploiting enemy communications equipment during WWII. The difference today is that US adversaries -- from terrorists to nation-states -- use many of the same systems, services, networks, operating systems, devices, software, hardware, cloud services, encryption standards, and so on, as Americans and much of the rest of the world. They use iPhones, Windows, Dell servers, Android tablets, Cisco routers, Netgear wireless access points, Twitter, Facebook, WhatsApp, Gmail, and so on.

US adversaries now often use the very same technologies we use. The fact that Americans or others also use them does not suddenly or magically mean that no element of the US Intelligence Community should ever target them. When a terrorist in Somalia is using Hotmail or an iPhone instead of a walkie-talkie, that cannot mean we pack our bags and go home. That means that, within clear and specific legal authorities and duly authorized statutory missions of the Intelligence Community, we aggressively pursue any and all possible avenues, within the law, that allow us to intercept and exploit the communications of foreign intelligence targets.

If they are using hand couriers, we target them. If they are using walkie-talkies, we target them. If they are using their own custom methods for protecting their communications, we target them. If they are using HF radios, VSATs, satellite phones, or smoke signals, we target them. If they are using Gmail, Windows, OS X, Facebook, iPhone, Android, SSL, web forums running on Amazon Web Services, etc., we target them -- within clear and specific legal frameworks that govern the way our intelligence agencies operate, including with regard to US Persons.

That doesn't mean it's always perfect; that doesn't mean things are not up for debate; that doesn't mean everyone will agree with every possible legal interpretation; that doesn't mean that some may not fundamentally disagree with the US approach to, e.g., counterterrorism. But the intelligence agencies do not make the rules, and while they may inform issues, they do not define national policy or priorities.

Without the authorities granted by the FISA Amendments Act of 2008 (FAA), the United States cannot target non-US Persons who are foreign intelligence targets if their communications enters, traverses, or otherwise touches the United States, a system within the United States, or, arguably, a system or network operated by a US corporation (i.e., a US Person) anywhere in the world. FAA in particular is almost exclusively focused on non-US Persons outside the US, who now exist in the same global web of digital communications as innocent Americans.

Without FAA, the very same Constitutional protections and warrant requirements reserved for US Persons would extend to foreign nations and foreign terrorists simply by using US networks and services â" whether intentionally or not. Without FAA, an individualized warrant would be required to collect on a foreign intelligence target using, say, Facebook, Gmail, or Yahoo!, or even exclusively foreign providers if their communications happens to enter the United States, as 70% of international internet traffic does. If you do not think there is a problem with this, there might be an even greater and more basic misunderstanding about how foreign SIGINT and cyber activities fundamentally must work.

If you believe NSA should not have these capabilities, what you are saying is that you do not believe the United States should be able to target foreign intelligence targets outside the United States who, by coincidence or by design, ever utilize or enter US systems and services. If you believe the solution is an individualized warrant every time the US wishes to target a foreign adversary using Gmail, then you are advocating the protection of foreign adversaries with the very same legal protections reserved for US citizens -- while turning foreign SIGINT, which is not and never has been subject to those restrictions, on its head.

These are the facts and realities of the situation. Any government capability is imperfect, and any government capability can be abused. But the United States is the only nation on earth which has jammed intelligence capabilities into as sophisticated and extensive a legal framework as we have. When the intelligence committees of both houses of Congress, multiple executive agencies under two diametrically opposite Presidential administrations, armies of lawyers within offices of general counsel and and inspectors general, and federal judges on the very court whose only purpose is to protect the rights of Americans under the law and the Constitution in the context of foreign intelligence collection are all in agreement, then you have the judgment of every mechanism of our free civil society.

Or we could just keep laying our intelligence sources, methods, techniques, and capabilities bare to our enemies.

âMany forms of Government have been tried and will be tried in this world of sin and woe. No one pretends that democracy is perfect or all-wise. Indeed, it has been said that democracy is the worst form of government except all those other forms that have been tried from time to time." - Winston Churchill (1874-1965), Speech in the House of Commons, November 11, 1947

"The necessity of procuring good Intelligence is apparent and need not be further urged â" all that remains for me to add, is, that you keep the whole matter as secret as possible. For upon Secrecy, Success depends in most Enterprises of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue.â â" George Washington, our nation's first spymaster, in a letter to Colonel Elias Dayton, 26 July 1777

Comment Re:Those terrorist sucks (Score 1) 1097

If you go back to the reports about the Paris attacks, they walked into the wrong office, killed the guy who gave them the right directions to find the Charlie Hebdo offices and then carried on gunning people down. Some people wrote they looked like highly trained soldiers, but to me it looked like morons with guns and uniforms catching civilians off guard.

This other pair or plonkers got trolled in Texas and probably wasn't even a big challenge to catch and shoot them. It's not nice of me to say it, but I'm not sorry they died.

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz

Working...