Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Disincentive? (Score 1) 234

...kind of the same reasoning they use to justify high ETF's that still cost over $100 one month before the contract ends.

T-Mobile pro-rates ETFs. My wife and I are changing plans with them in a couple of weeks to save $50/mo, but it'll be costing us $50 per line in ETFs on the current plan (presumably because the new plan is unsubsidized and the existing one isn't). The reason we're waiting two weeks is because we're right on the cut from when their ETF goes from $100/line to $50/line.

I believe there was a class-action lawsuit against some other carriers (Verizon I think?) about ETFs that basically forced them to pro-rate ETFs as well, so I don't think this is exclusive to our carrier.

Comment Re:What kind of data? (Score 1) 262

I'd really like to know what kind of information you have that still needs to be a secret in the year 2111 when we'll all be driving fusion powered flying time traveling cars and vacationing in hotels on the Moon and Mars and carrying petabyes of data on our iMicrosoftPods with end-to-end DRM that terminates in chip implanted in our brains.

The keys to the DRM, of course.

Comment Re:Eliminate all Chinese imports (Score 2) 264

In China, if your $180 camcorder breaks due to a burst electrolytic capacitor, you can take it to the corner electronics repair shop and pay somebody $10 to open it up, unsolder the bad capacitor, solder in a new one, and send you home with a working camcorder. In America, $10 wouldn't even pay the postage to ship it to a repair center, let alone the $100-200 or more you'd have to pay for the actual repair labor.

I have a TV that, due to some rough handling in a move, had one of the jacks for component input break off. It still worked if you could manage to get a cord to stay in just right (I think we had a solution involving tape, cardboard and clay), but otherwise was very fickle.

Presumably, somebody skilled in electronics could get a $2 jack and with 10-20 minutes or so solder a replacement into place. Instead, a TV repair shop wanted $75 just to diagnose the problem much less start fixing it.

I kept the TV (and did not end up getting it repaired), but the fact that someone here in the US would be more likely to spend $500+ on a new TV and just throw away the old one "because it's broken" is stupid, and I'd love to go to some shop around the corner and get it fixed for $10.

Comment Re:Ooh! I have a solution for this one! (Score 1) 164

Instead of using email attachments, make it company policy to drop the attachments on a network drive, and instead share intranet links.

Anyone who spear phishes with attachments will fail. Now they will need intranet access, which can be significantly harder to acquire.

This works well, right up until the point where you need an attachment from someone outside the company.

Say... the latest revision to a requirements doc being sent back and forth between a client and a vendor...

Comment Re:I expect... (Score 1) 150

Admittedly, I only skimmed it and did read that the results seemed to conclude that cell phones were not a cause. However, I was trying to explain someone else's post -- probably a futile cause. The word "speculated" in my post for a reason.

Perhaps I should have emphasized that other people have speculated and there's no real studies that prove or disprove it (I won't count a single study as disproving, for all I know the methodology was flawed.)

Comment Re:They found a compromise... (Score 2) 35

It's reasonable to assume the website is logically connected. CAs generally execute their transactions through the website. Especially for domain validated certs, usually the process of issuing a certificate is entirely automatic -- the customer logs in through the website, requests a certificate either by filling out a form or sending in a CSR. If they fill in a form and the CA generates their private key, the person who compromised the website might be able to steal the customer's private key, when the customer downloads it using the website.

It's been awhile, but I do not believe there is any point in the CSR process where the CA ever gets a copy of your private key.

Comment Re:It's a preliminary injunction (Score 2) 412

For instance, suppose I register a box with round corners. Now you show that the real reason for round corners is so that the box, designed to go in a pocket, will not put too much stress on the pocket material.

I know a lot of people who store their tablets/ereaders/etc in a backpack, which is basically a giant pocket on your back... and it does seem a very reasonable assumption.

It also makes it easier to get into any sort of carrying case -- hard corners means you need to line it up perfectly, whereas round ones mean you can just get it mostly-right and it will slide in easier.

So, even if the original intent of the design is for aesthetics, it does have practical use.

Network

Submission + - Handling an inherited house full of technology 3

Dewin writes: My father-in-law passed away earlier this year, leaving my wife as the executor of an estate including a house full of all sorts of hardware. There's a wide variety here — at least a half dozen computers and monitors (all LCDs, thankfully), mixing boards, a karaoke system, and a home networking setup with in-wall CAT5 wiring and no fewer than 3 wireless access points in addition to other networking hardware.

No one person is assigned specific items from the estate. It's a percentage share among the heirs, who are all (thankfully) on good terms with each other. Thus, we have some leeway in making decisions.

With that all in mind, we have the following questions:
  1. What's the best way to assess a value for all of the hardware in the house, and how do we determine what is worth keeping, what's worth selling, and what's just junk?
  2. Dozens of computers means dozens of harddisks, some of which probably hold interesting data either from an legal standpoint or a historical one. I'd like to find a way to aggregate all this data in one place quickly, ideally without having to look over each harddrive's contents or copying things like OS files.
  3. Is there any reason why I shouldn't just factory-reset all of the routers and reconfigure them to be in a known state (especially considering we lack the current admin passwords)? Considering I cannot get into the administrative interfaces for them currently, is there anything I should take note of first? There's nothing critical that we need running on the network that would break.
  4. I suspect the in-wall wiring is too old to support gigabit ethernet speeds, but I'd like to test (and possibly address that) if possible. Any tips?

We are on a fairly tight budget, so while purchases are an option we'd like to keep them fairly cheap and ideally something that will continue to be useful after the fact. Thanks!

Supercomputing

Submission + - IBM, NCSA Abandon Petascale Supercomputer Project (computerworld.com)

CWmike writes: "Citing unforeseen complexities and greater-than-anticipated costs, IBM and the University of Illinois' National Center for Supercomputing Applications (NCSA) have abandoned plans to build a petaflop-speed supercomputer, the two organizations said Monday. As of Aug. 6, IBM had terminated its four-year 2008 'Blue Waters' contract, estimated at about $208 million, to developed a supercomputer. IBM had been expected to deliver the first version of the system within the next year or so. 'The innovative technology that IBM ultimately developed was more complex and required significantly increased financial and technical support by IBM beyond its original expectations,' the joint statement read. 'NCSA and IBM worked closely on various proposals to retain IBM's participation in the project but could not come to a mutually agreed-on plan concerning the path forward.'"

Comment Re:Gamepads allow multiplayer (Score 1) 261

A sword fighting game using a mouse to control the sword would be pretty interesting.

Daggerfall used mouse movement to determine how a weapon was being used. Thrusting the mouse forward while holding the attack button would do a forward thrust, and you could also slash side to side or diagonally.

Slashdot Top Deals

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...