Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re: Adaptive, requiring 'training' & 'stabilit (Score 2) 145

"Then maintain a pointer in some so-called 'phase space' and burn data into a sparse array to create a virtual landscape with erosion. In 'run' mode it is almost always hitting (or near) areas that have been populated. If the pointer strays from from the populated region we have an alarm."

Could you please post a link to more information about these technologies and algorithms? I am very interested in graph analysis, including geolocation of information against a real or metaphorical landscape. I tried Googling but all I got was how to simulate erosion in a 3D image of a landscape.

Thanks

Comment Re: Share your "encryption network" with Suckerber (Score 1) 138

Using JavaScript, FB can tell if someone selects your public key that is posted on your profile. (Yes, IF you choose to post it as well as just let FB use it. However most people are very likely to do so.) Have you ever clicked in a field that said "Search," or whatnot, only to have those words disappear as soon as you clicked there? That is JavaScript doing that. It is just as easy to have said JavaScript save the current user and the page's user and store them in a database. FB can then use this database to build a directed graph of who is copying who's public key. Sure, it is an incomplete graph, but all social data is incomplete and useful information is still drawn from it. Sure, the NSA could do a deep packet scan of everyone's e-mail and dig out the same, or better, information. However, that is far, FAR more resource intensive and expensive than adding a field to FB's database and some more JavaScript to the profile page.

So, once FB has built their, admittedly incomplete, graph, the NSA can look for the clusters of interconnectedness in said graph and focus their deep packet scanning efforts and resources there. Thus making the NSAs efforts far more effective.

I guess, if you want to save the taxpayers some money, go ahead and post your public key to FB. If you really want to promote encryption, include your public key and links to free software and incredibly easy to follow instructions in all your emails to your non-techie friends and family. If said relatives are conservative nutjobs then you could also include a comment about how the socialist, terrorist-loving, Nigerian, Muslim, presidential imposter (read: black guy) is reading all their personal e-mails and building a list of where to send the black helicopters. I have many such relatives. Believe me, they still believe that crap.

Comment Re:Defensive (Score 1) 97

Legally, you don't have to file a patent to prevent others from patenting things and then suing you. All you have to do is write up a description of your invention, as thorough as a patent, and publish it in any number of ways where the date of publication is verifiable. There are even services that will publish your article expressly for the purpose of establishing prior art. Remember, prior art does not need to be a patent. Dick Tracy's wrist TV was used as prior art at least once. Almost any public use of an invention is also enough to establish prior art. That is the main reason why inventors have to be careful not to let their invention be seen in public before filing. Your own invention can be considered prior art to invalidate the patent on that same invention.

Though, I do have to admit, in the current environment, having a patent goes a long way toward scaring off those trolls.

No, I am not a patent lawyer, but I have read a ton of patent law books over the years.

Comment Re: Share your "encryption network" with Suckerber (Score 1) 138

If only you had read between the lines of said summary, based on FB's past behavior. If you share your public key on your profile, I guarantee you that FB WILL keep track of everyone who downloads it.

The safest way to share your public key is to share it ubiquitously on your web page, in your e-mail signature, etcetera. Then no one can find out who is actually using it and who is ignoring it. (OK, other than deep scans of your traffic.)

Comment Share your "encryption network" with Suckerberg! (Score 3, Insightful) 138

Right, that's exactly what you want to be doing if you are interested in encrypted communication... Share the list of other people who want communicate with you via encryption. That way the most intentionally invasive service in the world can build a giant graph of everyone who communicates via encryption. Then the NSA will know who to focus their efforts on just by who has had the most people download their public key or who is at the center of the largest clusters of connectivity.

This could possibly be countered by having everyone download lots of random people's keys. But only if FB doesn't require you to be "friends" before you can exchange keys.

The best way to counter it is to let all the sheeple use it, to give the NSA something to play with, while the astute "encryptionistas" ignore it.

Comment Work remotely (Score 1) 583

Develop a skill set and the self discipline to work 100% remotely. Then you can work for a company in an expensive city while living anywhere you want.

Sure, not all companies will hire 100% remote employees, but it opens up your job search to the entire world instead of just the companies within driving distance of your house. It also allows you to work on multiple contracts at the same time.

Comment Re: Correct, but silly (Score 1) 172

If a work is "transforative" merely because it is displayed in a new context, thus giving it new meaning, then copying a $90k work and selling it for $90 to make a point about how much bullshit this whole "transformative" thing is is therefore also transformative, and thus should be allowed. If some random person was just selling cheap copies to make a quick buck, then this wouldn't apply. But, because it is the original owner of the image selling said transformations-twice-removed (or meta transformations), then fair use should apply.

Comment I went the other way. (Score 4, Interesting) 227

I got out of networking because it is too high stress. All you do is put out fires all day. None of the network equipment I ever used actually did everything the vendor said. All of the software you will have to support is crap, and you can't rewrite it.

Networking is an entirely different skill set. Almost none of your current skills, other than management, will transfer. So that may be your best path. Go for a job as a CIO. You can manage big projects, help them avoid crappy software purchases, and not have to learn a thing about actual networking.

Slashdot Top Deals

The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford

Working...