Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Typical miss-understanding of the GPL(2) features. (Score 1) 115

You don't have to take the code private to sell the product.

Under the GPL (2)

#1 You can make your own changes to the product source code
#2 You can build that product
#3 You can sell that product for any price you want.
#4 You -do not- have to publish the src code on the web.
                If your customer requests a copy of the GPL source code, you give them a copy. You can charge a reasonable fee for making the copy. You can provide the copy as regular text source, or a paper printout, or a pdf file etc..

#5 If you use GPL(2) code in a product you build, you don't have to share the code you yourself created - IF IT MEETS EITHER ONE OF THESE TWO REQUIREMENTS:
#1 The GPL code you use is LGPL and all you do is link to it.
OR
#2 you structure your code so that it is only dynamically linked to the GPL(2) code. I need to double check on this one and i dont have time right now. I'll try to get back to y'all on this.

Comment Re:Slightly off topic, but you're a dipsxit. (Score 1) 515

Slightly off topic, but you're a dipsxit(sic)

Hiya troll! First of all, always start with an ad hominem. It really bolsters your own argument, doesn't it?

Sorry, I thought you were a Fox news zombie-ite. Your total swallowing of the story, hook line and sinker, makes you look no smarter than Rezwan Ferdaus. So I was looking for the right word to describe the level of insipidness you displayed when you said: "This guy was defeated by the groundwork done by the FBI in tracking him, contacting him and then catching him red handed while he was planning the operation."

See let me see if I understand this - You want to give the FBI credit for good work done on "catching a terrorist" when all they did was seduce one socially isolated, depressed, unemployed 26 year kid who still lives with his parents??????

They caught nothing. They created a security theatre event in order to make news.

They would have been smarter to monitor him and see if he went and contacted an actual terrorist group. Then they could have used him for a stalking horse to actually find some real terrorists. Instead they are pretending for the news cameras complete with, yes really, Stage Props! They did a full-on, totally armored up, SWAT team deployed and helicopters overhead "ARREST ZE TERRORISTS!" when they "stormed" the "u-store-it". And they did all that when they KNEW the kid had nothing but stage props that they had supplied him with.

Fake C-4, tricked-up non-functional guns, WooHoo! thing going to be 'sploding now!

To be absolutely clear, the FBI did NOT CATCH A TERRORIST. They fooled a naive, possibly slightly mentally ill kid, into doing the things the FBI needed done in order for them to create a big news event.

How do you know that everything that he did wasn't suggested to him BY THE FBI? Because the odds are that's exactly what happened. Go look at the news reports and you'll see that he was "recruited", they came to him.

Yes, I'm pissed off - The FBI is supposed to work on security. Not making sure their department gets a good place in line at awards time or insuring they get a good chunk of the next budget go-round. They're wasting time, manpower and money that should have been much better used.

The guy was 'defeated' because he wasn't a terrorist at all. He was stupid dupe of the FBI.

And how did the FBI get to know of his plans in the first place?

"The FBI got to know of his plans in the first place" because AFTER they recruited him into their organization, they made it clear to him what he should do next. Its no different than what the Church of Scientology does when it gets a new vic.. err member, or for that matter not much different than what a terrorist recruiting cell does when they convince someone to join their cause. The FBI was giving him plans and/or nudging him in one direction or another and discussing it with him on an ongoing basis. Remember he didn't even bring a camera along when he went scope out the pentagon, so they gave him one to use!... LOL I can see it now. A big white panel van roaming around DC just stuffed full of everything your basic terrorist needs, all dolled out to them by the FBI.

I don't know how you missed it, because its required reading in almost every junior high school in america

I'm not an American, so sue me.

I'm sorry, I didn't mean to insult you that deeply. :-) ( btw , the author's British, the book has been incorporated into the educational curricula of many places around the world, but you're right. I shouldn't have assumed you were from the US. )

Here's a fellow who given a chance, would actually go and get hold of an RC plane with explosives. It is moot whether the people supplying him were undercover FBI agents or terrorists themselves. He absoFUCKINGlutely knew what he wanted to do, and what the consequences would be. At any stage he could've backed out and refused to go along with it, or even gone to the cops himself. He chose not to.

Well, No. We have no idea what he would or would not have done if he had NOT been recruited into the FBI's fake terrorist group and now no one will ever know. Was this truly a case of entrapment where the LEO's actually talked someone into doing something criminal? (and it wouldn't be the first time which is why we have those laws against "entrapment" now.) Or were these his ideas? Could be either one.

Ever seen the Milgram Experiment? Under the right circumstances, 95% of the population can be simply talked into killing another person. http://en.wikipedia.org/wiki/Milgram_experiment./

By the by, when I worked on my first Defense contract some 25+ years ago, 1986, some of the old-timers told me lots of stories about all kinds of things that went on in the intel areas. One of those concepts that stuck with me was the "use a commercial jetliner as a bomb to take out a sky-scraper." plot. Seems there was an incredibly simple fix for it too. Seal the bulkheads between the pilots cabin and passenger compartment. Put a separate external door on the cockpit. Thats it. No more hijacking. So the US Govt had known about the possibility of a 9/11 type scenario and the way to prevent it for decades. But didn't prevent it.

Hmmmm.

I'm from India and I utterly loathe the vile politicians who have ruled us over the last 50 years, each more corrupt than the last. I would love to see their heads roll, doesn't mean that if someone hands me a sniper rifle and exhorts me to get rid of them I'll actually go postal on their asses. If I do, then I'm aware of what I'm getting into, and from their point of view, I am a threat BECAUSE I am actually acting on the impulse to kill them.

So you're not willing to fight for your country? Its your duty as a patriot to rescue your country from those corrupt bastards. Only a coward would stand by while every one else fights! Here's a gun and some C-4. Hang on, I've got an RC-control unit around here somewhere....

Comment Re:Slightly off topic, but you're a dipsxit. (Score 1) 515

The guy was 'defeated' because he wasn't a terrorist at all. He was stupid dupe of the FBI.

#1- He was recruited by the FBI so he was working for who....?

The FBI

#2 He received Fake weapons from who......?

The FBI

#3 He received funding from who.....?

The FBI

So - he never had any contact with the what.....?

Terrorists

So this whole thing was a hoax done by who.... ?

The FBI...........

Dear dipsxit I don't know how you missed it, because its required reading in almost every junior high school in america: What the FBI did here, was a rip-off of the plot of the book "1984" , with a twist of lemon.

Now dipsxit, Who said "Naturally, the common people don't want war; neither in Russia nor in England nor in America..... That is understood. But, after all, it is the leaders of the country who determine the policy and it is always a simple matter to drag the people along, whether it is a democracy or a fascist dictatorship or a Parliament or a Communist dictatorship. ...voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is to tell them they are being attacked, and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same way in any country."

Was it Karl Rove, Dick Cheney, or Hermann Goring?

And where is this type of political campaign being practiced today?

If reading is too much of a bother, how about watching "Wag the Dog", or "Brazil", or even the movie, "1984".

He was caught "Red Handed" ...... ahem - planning ? planning is not doing. so "Red Handed" is not quite accurate. Especially since all the things he was planning were fomented by who.....? Yes, once again "The FBI"

I'm sorry I called you a dipshit. You're nothing but a tool. A tool with a dull finish.

Comment Mirror mirror on the wall-E ..... (Score 1) 138

I love the thinking behind this, technology ubiquitously deployed so that it's everywhere: available, literally, instantaneously. The article mentions that we, and I'm assuming we means the average American in the USA, spend an hour in the bathroom every day. And the New York Times intends for us to use some part of that time to read their newspaper. hmmm...
People spending that hour in the bathroom are busy doing their daily grooming which pretty much ties up their active eyesight and participation.

The very first thing I thought about the product was, a mirror that lets you surf the web while you're grooming? The idea is good geeky fun, but is it really useful and usable?

Now that I have read the article and watched the first video, I can see that some good thought has been put into how people may want to use it.

Yes, people's hands are busy while they're in the bathroom, (and they should wash their hands before they touch anything...), So a mouse interface is not a good idea. The innards of the mouse would soon be gunked up, rendering it useless. Between hairspray, steamy water vapor, and makeup powder, even an optical mouse would be inoperable. And a women's bathroom would be just as bad. :-)

The way to make this product successful is to put a much better voice response interface on it. The user should be able to have a conversation with the product and have it act as their agent. In the demo the system is responding by changing what it displays on the screen. You should be able to "chat" with it. If you're shaving, or if your putting on false eyelashes, you should be able to ask the system a question, and have it respond to you by voice rather than forcing you to go look at something. Any time you're waving a sharp blade near your face, or gluing anything on your eye, you don't want to take your eyes off what you're doing....

And the read back voice has to be natural and pleasant sounding, and naturally, customized to the user's preferences. Of course the Kinect system should recognize each individual it has been set up with and switch to their user profile as soon as they recognize them.

For example, if the user says "where is the movie the way you were showing today?" Notice that the user doesn't put the movie title in quotes or specially delineate it in any way verbally. The user has to be able to rely on the system to successfully parse the verbal utterance when it is the normal and natural way people speak.

The system needs to respond with "that movie is showing at 4 different theaters that are near you" (if the movie was only showing at one or perhaps 2 theaters, then the system would immediately say the names of those theaters, as in "that movie is showing at the Strand, and the Cinemax".

The system will need to know what theaters the user is already familiar with. That is the kind of information it learns over time from interacting with the user. As further training for the system, as the system interacts with users from all over, it should tokenize the interaction sequences, remove all the personal identifying information, and upload the tokenized interaction sequence to a central repository. That way the central repository can learn all the different ways users have of interacting with different named things and improve the number of things the agent side know how to do. For example, an object named "movie" has its own name, [title], and each movie can be associated with one or more theaters. Each theater is associated with a physical address, and a phone number, and of course its own name. And the relationship between movie and theater has associations with multiple show time/sub-theater pairs. The show time/theater pair that is associated with the movie-theater relationship has 2 properties associated with it, the 1st is the time the movie will be shown, and the 2nd one is which sub-theater at that theater the movie will be shown in at that time. Since the system understands all these relationships, when the user asks "what time is it showing at the Strand", it understands, from tracking context, that "it" is referring to the movie. And it understands that the query means to display the information in the movie-theater relationship, which is made up of the show time/sub-theater pairs. By the way, in addition to the show time/sub-theater pairs, the movie-theater relationship also has a start date/end date pair associated with it, so if the user asks "how long will it be at that theater", the system will know to respond by reading off the end date of the start date/end date pair associated with that movie-theater relationship. Clearly all this fancy capability implies that the system knows how to go out on the Internet and successfully find that information about the movie and successfully parse that information into the appropriate pair relationship fields. And that may be almost as hard as doing good speech recognition.

Of course the system should not only respond by voice. When it makes sense to, it should also display information. For example when it has to list out the showtimes of the movie, it might want to actually generate a vertical numbered list of the showtimes on the display while it is reading them off. That gives the user the information into different formats, and makes it unnecessary for the user to try to memorize the times when they are read off. They can just glance at the display. "send Bill an e-mail asking him if he wants to go to the 2nd showing with me" In response to this command, the system should be able to format an e-mail containing all of the implied but unspoken information as well as the spoken information and dispatch it to Bill who is a person the system is aware that the user is familiar with. If there is more than one "Bill", the system should ask the user which one they mean. In this particular instance the spoken information was the selection of a show time, and the system needs to format the e-mail message correctly using both the spoken information and the unspoken, but implied information. So the content of the e-mail would be "Bill, Susan wants to know if you would like to go to - the system needs to insert the movie title here which was some of the unspoken but implied information - at the - here it inserts the name of the theater from the assumed information - at - here it inserts the unspoken but selected information of the time of the show - . Then the system includes Susan's default contact information, which might be an e-mail address or a twitter etc. and sends the e-mail out. Alternately the system might use one of the more immediate messaging tools instead of e-mail, but the information sent over is the same.

The videos imply a great deal of detailed knowledge about the user's environment and daily routines being captured and properly structured within the system's data/database. If this system were to be used in a home where there is a family, the system needs to be configured in a way that prevents children from accessing information or privileges that must be constrained to the adults. So on this system security is going to be a major issue. Especially since humans who are not registered users of the system could enter the bathroom and be misrecognized as valid users with adult access privileges. Imagine the snoopy neighbor, or someone from work asking to review your medications!

"Oh look, Susan is taking a an anti-psychotic medication!"

This idea clearly has enormous potential to improve people's lives and make them more productive. The idea of a software "personal agent" is something those of us with weaker organizational skills would kill to get a hold of.

The ways the agent manipulates the data has to be extremely open and flexible. In contrast, the closed design that Microsoft's e-mail product, Exchange has, is much too restricted and limited. Part of making this product successful includes making sure that the personal agent has the ability to interoperate smoothly with any potential outside data source or resource management utility. A resource management utility could be someone else's calendaring system. The personal agent needs to be able to negotiate and agree to a date and time with that external calendar system on behalf of their user. A software tool which can only interoperate with software tools from the same software manufacturer can't make it in a world where the most successful smart phone models are from other manufacturers: the iPhone and the "Android" smart phone platform from many companies. This means a significant change to Microsoft's "lock everyone else out!" design approach. If Microsoft can make that philosophical change, that forces the rest of the market to also try to make sure their software will interoperate with other "personal agent" type utilities. No personal agent software product is likely to be successful unless *All Companies* personal agent software products can interoperate with each other.

Because the hardware platforms available as personal computing devices for people, "smart phones", and iPads, and iPads competitors, are diversifying explosively, Microsoft's traditional integrated software silo approach is going to start causing them more economic harm than advantage. Yes Microsoft is still the big player, but the way people use computing is changing and in order to stay the big player that it is, Microsoft will need to change its approach to be more interoperable, and play nicely with other systems.

Here is one interaction scenario: Susan is in the bathroom and wants to review her schedule.

"Mirror mirror on the wall, which Prince is going to take me to the Ball?"... Oh never mind, that's from the script I sent to Disneyâ¦

Ok, let us return to Susan.
"Mirror what's coming up?"
"You have one appointment tomorrow, and you are meeting Bill on Saturday at 2 o'clock for the movie "The Way You Were".
"Next week you have a doctors appointment with Dr. Williams on Wednesday at 10 AM." You also have a meeting with Karen Johnson on Wednesday at 9:30 AM."
Susan realizes that the 930 meeting with her boss definitely conflicts with her doctors appointment.
"Mirror, cancel my appointment with Dr. Williams and reschedule it for the earliest time they have open, that I'm available for."
The personal agent contacts the doctors offices scheduling agent over the Internet, and sends over a request to move Susan's appointment to the next available time with Dr. Williams. The doctor's office agent cancels Susan's existing appointment, and sends back a list of times that Dr. Williams is available. Susan's personal agent parses the list of times and finds the 1st time slot where Susan is also available. Since the personal agent system is aware of travel time issues it examines Susan's schedule both before and after the time of the doctors appointment to make sure that there time for Susan to travel to the doctor's office from her workplace and to travel back after the appointment. If the agent detects there may not be enough time, the user agent can ask the Susan about the situation, and Susan can direct the user agent as to what she wants done.

"Susan there is a 10 o'clock appointment with Dr. Williams available on Thursday, but the travel time from your office to the doctor's office is 35 min. and you only have 30 min. available after the morning staff meeting to get to the appointment."
"Mirror, okay book me that time with Dr. Williams" Susan knows that the staff meetings tend to break up earlier than the time they are scheduled to end at. And besides if the meeting goes long, she'll have an excuse to leave! :-)

Of course this level of intelligent object manipulation and interaction with the human has been the Grail of personal productivity systems forever. In a sense what's being described here is the perfect administrative assistant who is there, 24x7 and never tired and never forgets anything. Unfortunately this can never happen unless all of the software vendors who build resource management software like calendars and personal schedulers and bill paying systems etc. all have the same interoperability protocol as part of their tool.

As you can see from the length of this posting, and, from the probably embedded miss phrasings , I not only want a speech interface system to a personal agent, I am using speech recognition software to generate this post.

[aside]:One of the issues with speech recognition software is that using it changes the way you compose written work. When I am using speech recognition software I tend to generate rather long, run-on sentences, whose logical structure is difficult to parse. This is just one of the side effects of using speech recognition.

Comment Re:Obvious question from their perspective (Score 1) 1307

> Wouldn't this also be a HIPAA violation?

No, It wouldn't be (a/an)[**1] HIPAA violation. None of the data on that server would be patient data. It would only hold info about when which staff is working.

[I'm very surprised how many people appear to not have read the question, but I guess I shouldn't be. This is slashdot.]

I'm also surprised how many people don't understand the actually, totally facile nature of the HIPAA guidelines.

HIPAA Guidelines[**2] only apply to patient identified data and its related ilk.

It certainly might be a good idea to see what liability issues could ensue from the server.The most important might be analyzing how/if it could be used as beachhead to attack other equipment on the network, which could lead to a HIPAA breach.

The funniest thing in this whole thread: The levels of anger, hostility, vehemence and what appears to be outright hatred being poured out at this person.  I guess its true, most of the people who have time to read slashdot are the incredibly over-worked IT people.

The other funny thing is how absolutist, "black and white" the positions about what HIPAA means, were.  Sorry folks - HIPAA is nothing if not malleable. Every state has had to come up with its own version of what the rules mean and virtually all of them got it wrong. [yes, I did go and read the actual legislation.  Its been bent way way off course from its original purpose by people within the healthcare system who are using it to get a bigger slice of the institutional budget pie.]  Further an entire industry has sprung into existence to help people 'understand' what HIPAA means. And boy are they helping. Helping take tons of money out of the healthcare industry and into their own wallets.

Very little actual good has come out of the HIPAA mandate. Mostly is has been turned into a huge cash-sucking layer of  bureaucracy that often does more to impede  taking care of people and waste money than it does anything else.   Sadly that makes it very little different from much of the rest of the American 'healthcare' industry.  Over the years 'healthcare' has become a misnomer. A better name would be 'WeWealthCare' and no, that's not a typo.

**1 Rules are changing, your call: a hippopotamus or an hippopotamus? USA == "a", UK == "an"?
**2 they are too poorly written, (vague and generalized nigh unto death), to be called rules.

Comment Re:Palaces? (Score 1) 290

I can't comment on this dude having a normal memory or otherwise, but he certainly has a pretty closed mind. There's a big difference between a well trained mind and a true photographic memory. Some people just remember *everything*. It's not something they train themselves to do, or use a technique, it's something physically different about their brain that makes it work that way.

That you believe the myth doesn't make you more open minded. *IF* there were true photographic memory, then the prizes at these world memory championships would be scooped up by people that have it. But they're not.

BZZZT! Sorry, you failed to give your answer in the form of a question. The correct answer is "What is someone who doesn't believe in scientifically documented genetic phenomena but instead chooses to make up their own reality and denegrate others who don't believe as they do?"

The reality is that there are both people with strongly trained memories and those who are just happen to have the right mix of genetic traits to have good memory, or unbelievably fantastic memory. In any case the term "Photographic memory" is incorrect. The correct term is "eidetic memory" and it does not lend itself to the types of memory competitions you describe because it is strictly a recall talent, not an organizing talent. The so called memory contests actually require both recall and organizing ability.

There are many different kinds of Eidetic memory talents, one recently documented to exist in eight people is called Hyperthymesia, a condition where the affected individual has a superior autobiographical memory.

Individuals with hyperthymesia can recall events that they have personally experienced. A hyperthymestic person can be asked a date, and describe the events that occurred that day, what the weather was like, and many seemingly trivial details that most people would not be able to recall. They often can recall what day of the week the date fell on, but are not necessarily calendrical calculators as people with autism or savant syndrome sometimes are; the recall is limited to days on a personal "mental calendar".[2] The mental calendar association occurs automatically and obsessively. Unlike some other individuals with superior memory, hyperthymestic individuals do not rely on practiced mnemonic strategies.

Eidetic or photographic memory is popularly defined as the ability to recall images, sounds, or objects in memory with extreme precision and in abundant volume. But the popular term "Photographic memory" and the abilities the public associate with it, are indeed fictional. People with eidetic memory do not have to use any mnemonic strategies to employ their talents, and typically their recall abilities are not sequentially continuous. Instead they can recall specific individual experiences.

Eidetic memory as observed in children is typified by the ability of an individual to study an image for approximately 30 seconds, and maintain a nearly perfect photographic memory of that image for a short time once it has been removed—indeed such eidetickers claim to "see" the image on the blank canvas as vividly and in as perfect detail as if it were still there. Much like any other memory, the intensity of the recall may be subject to several factors such as duration and frequency of exposure to the stimulus, conscious observation, relevance to the person, etc. This fact stands in contrast to the general misinterpretation of the term which assumes a constant and total recall of all events.

Some people who generally have a good memory claim to have eidetic memory. However, there are distinct differences in the manner in which information is processed. People who have a generally capable memory often use mnemonic devices (such as division of an idea into enumerable elements) to retain information while those with eidetic memory remember very specific details, such as where a person was standing, what the person was wearing, etc. They may recall an event with greater detail while those with a different memory remember daily routines rather than specific details that may have interrupted a routine. However, this process is generally most evident when those with eidetic memory make an effort to remember such details.

Comment Re:This is a big deal for me. :-( (Score 2) 459

.

It baffles me that some large email providers like hotmail and AOL don't implement DKIM. The added CPU load is negligible on a modern machine.

If it's "negligible", why don't you pay for them to implement it? Do you really think your small business solution that adequately handles hundreds of messages a day on a single machine will scale to millions of messages a day on a server farm?

You mean like Google groups and Yahoo who both use it? I think Google understands scaling pretty well. I suspect they aren't having any issues with the compute load of DKIM, to the tune of billions of emails.

Comment Re:Not much to do (Score 1) 459

that since they're BUSINESS lines, they'd be static IPs.

    Actually, that's an incorrect assumption.

Actually its not an incorrect assumption, its a reasonable normal assumption:
from a comcast web page, note the last item in the feature list:
Comcast Business Class Internet \n Blaze new trails with big business features.

Whatever the size of your company, it needs to respond quickly to the needs of customers, communicate reliably with suppliers, and find smarter ways to increase employee productivity. That's why Comcast Business Class Internet offers:

Downloads up to 50Mbps, uploads up to 10Mbps
Internet speeds up to 64x faster than T1
Flexible Web hosting options
Norton Business Suite security and virus protection
Free Microsoft Communication tools
** Static IP addresses **

http://business.comcast.com/internet/index.aspx

but then, of course, they are engaging in a not so subtle misrepresentation. following the link to the next page you find out you have to pay extra for a static IP.

As for verizoned - well they're still selling like they are the phone company: "Hot Dead Chickens! gett your Hot Dead Chickens! "
http://smallbusiness.verizon.com/products/internet/hsi/plans.aspx?tfn=s2&CMP=KNC-SMB_D_P1_CS_Z_Z_U_Z165
note the AD is targeting small businesses like a hair dresser, and then uses terminology like 3/7 mbps/kbps to describe what they are selling.
Here the static line is an extra fee option.

Frankly, calling any service "business class internet service" that doesn't include a static IP as the standard base is false advertising as its useless for a business identity, a web server, and email on the internet without a static IP. But hey: "We don't care. We don't have to. We're the Phone Company."

comcrap and verizoned - both fraudulent by nature. In a truly free market neither would exist, but wired/fibered telecomm will never be a free market and neither of those companies is at all interested in competing in a free market. See "regulatory capture".

Comment Re:Not much to do (Score 1) 459

and I'm pleasantly surprised to hear that Comcast/Verizon have finally started to implement what every other responsible ISP has been doing for a decade.

Uhm, hey Rip Van Winkle, don't nap so long next time. They've been doing it for at least 7 years.
http://www.zdnet.com/news/comcast-takes-hard-line-against-spam/136518

Comment Re:Not much to do (Score 1) 459

Again, Business class services from comcrap and verizoned are STATIC IP's, not dynamic. Its the ISP's fault for not keeping up with managing their static vs dynamic IP addresses lists properly and keeping them updated with the various block list services, or for giving the business customer a consumer class IP.

Comment Re:Not much to do (Score 1) 459

That won't help. The article says "Additionally, a lot of ISPs just started blocking any mail coming from any IP in the address block of cable modems." Even if they could send out from Comcast (or whoever they use) they will most likely be blocked by the receiving server.

Again, this is the ISP's fault for either giving them an IP thats not in their block of static IP, but was instead listed BY the ISP as a dynamic IP and therefore putting that IP on the blocklist, or for giving them an IP that was static but somehow the ISP added it to the Dynamic IP lists.

Comment Re:Not much to do (Score 1) 459

You have several options.
1) Get a real internet Service provider.

Like who? GoDaddy? Ha ha ha ha ha ! Comcrap and verizoned are two of the largest ISP's in the world, and not just for consumers, for businesses as well.

2) Host mail on a different server such as a vps
3) host mail on a different server and use Fetchmail to pull mail and send mail out bound.
4) Configure your server to send mail through your ISPs send mail server. Receiving mail may be a problem depending on ISP.

There is no sane reason why any typical business should have to route their email through the ISP's mail server, or use some remote server no on their own IP address if they have a business class service. The entire point of business class service is to have a static IP and have "real" internet access, as opposed to what the consumers get. (However, No one can claim that C+V treat their customers in anything resembling a sane fashion. It come closer to rape. )

That means the ISP shouldn't be doing ANYTHING to the businesses traffic and the ISP should be guaranteeing that the IP they have given the business is not in the DUL or any other RBLS of Dynamic IP's

Comment Re:Not much to do (Score 2) 459

Both comcast and verizon's business services provide static IP addresses, and those addresses are not supposed to be in the dynamic IP blocks which each ISP provides to the various block list services.

If the ISP itself is blocking the outbound port 25 port, and/or reporting the IP they gave you as dynamic, complain bitterly, and sue. Begin the law suit immediately after they don't fix the problem within a few days after a written complaint. Solict other businesses who have been adversely affected and mount a class action.

Enec: - the static IP's given by Comcrap and Verizoned are not in the dynamic IP pools unless those respective companies specifically listed them in the dynamic pools, which they should NEVER do with their business class IP's. The blame here clearly lays at the feet of the respective ISP's eg: Comcrap and Veryzoned.

Comment Re:I know what caused it (Score 1, Interesting) 222

On Monday February 14, @01:35AM. XPeter said:
> You fuckers need to stop with the horrible MS virus jokes, it's old and untrue.
> if Linux or OSX had 90% of the market, they'd be much worse off than Windows

XPeter
the idea that other operating systems are just as vulnerable as Windows, and would be as equally compromised if they were just "more popular" is incorrect. The problem comes down to an architectural design choice. Because Windows inherited its design from earlier versions of Windows, the ability for a subverted process to be used to gain an illegal privilege escalation is much easier on Windows than it is on many other operating systems, for example, Linux, UNIX, and BSD.

Here is an excellent article you can read about the differences :
http://linuxmafia.com/~rick/faq/index.php?page=virus

It was written by Rick Moen and does a good job of explaining all aspects of the issue, including what the status of "Linux virii** in the wild" are.
This article is fairly comprehensive and is pretty short considering how much ground gets covered. Unlike many Computer science texts, Its very readable and clear in straight forward English. Clear, concise and readable writing is just one of Rick's talents.

Rick has a collection of excellent articles on this and many other issues. Take a look and have yourself a good read.

**Note- Rick hates the word virii. Exactly why isn't quite clear. Part of the reason seems to be that although the word "virii" was clearly Latin and/or Greek inspired/influenced, it was never actually a Latin or a Greek word. And there seems to this notion floating around that unless a word was originally a word in Latin, that it can't become an English word. Thats completely untrue, of course. For example "google"*** was never a word in any language and is now a commonly used verb in English and other languages as well. Latin, being a dead language, cannot change, but English, can and does, and has new words added to it with great frequency. So I stick it in there once in a while just to gently needle him****. :-) [ My gosh, I hope he doesn't get infected with any virii, while I'm needling him. :-) ]

*** google, as a verb, nominated for word of the year in 2002, was also selected as the most useful verb of the year 2002. Sadly "google" wasn't added to large dictionaries (Oxford (OED), Merriam-Webster (MW) ) until 2006, years behind the actual date of usage adoption. Dictionaries are typically years or sometimes decades behind current usage. MW does note the first usage as a verb in 2001, five years before MW added it. Today linguists use Google's(TM) search engine, as well as others to determine when a word has come into usage.

**** All Linguistics texts, as well as many Linguistics books written about language formation and even those written specifically about English, agree that the only authoritative rule for whether something is a word or not, is usage. If multiple people use the same sound for the same meaning, then it is a word. Isn't that just bootyliscious?******

***** The motivation here is basic jealousy.... :-)

****** bootylicious: MW added in 2001/2, OED added in 2003

Slashdot Top Deals

Many people write memos to tell you they have nothing to say.

Working...