Please create an account to participate in the Slashdot moderation system


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Actually (Score 1) 532

by John.Banister (#49101109) Attached to: Stephen Hawking: Biggest Human Failing Is Aggression
If you want to engineer people at that level, it's probably better to make sex distasteful but have a desire for the continuation of the species. Think how much better the circumstances for children would be if people had to overcome their dislike of sex in order to get the children they want.

Comment: In Kansas City (Score 1) 227

At the evil ISP monopoly conspiracy meetings, I have to imagine that ATT will get as big a head slap as Verizon might have for suing the FCC into its Title II declaration. Now when companies say "our merger will be fine for those customers," two sets of gigabit providers in Kansas City will be the perfect counterexample.

Comment: I read these stories (Score 1) 271

by John.Banister (#49046417) Attached to: Peak Google: The Company's Time At the Top May Be Nearing Its End
About how Google doesn't try to do better than break even with Gmail and Android and Google fiber, etc., because these things put more eyes into Google's advertising. Now I read about how Google has seen "little return on its investments" but is maintaining 20% growth in advertising.

Comment: The catch - from the article (Score 1) 100

by John.Banister (#49042371) Attached to: Starting This Week, Wireless Carriers Must Unlock Your Phone

There’s always a gotcha. These new rules are effective going forward so carriers could argue that only phones launched commercially after this date should be subject. Also, the rules were put together and agreed upon by the CTIA, formerly the Communication Telecommunication Industry Alliance, i.e. the carriers and a few other corporations. It feels a bit like the foxes watching the chicken coop.

Comment: Re:Add noise (Score 2) 86

by John.Banister (#48931553) Attached to: Georgia Institute of Technology Researchers Bridge the Airgap
What if you build a Faraday Cage and put the jammer inside it? Then if the FCC shows up, they can help you improve your Faraday cage.

Or, if you're in a spy movie, you could have an array of jamming antennas that leave a quieter zone corresponding to a weakness in your Faraday cage, and right there you broadcast a signal you generate that interprets back to the random browsing of this fellow from India whom you pay to have spyware recording and sending you his online activities.

Comment: Those who grab for power can't be trusted with it (Score 2) 77

From the article:

Mr Cameron has previously said in relation to cyber attacks that there should be no "means of communication" which "we cannot read".

It sounds like Mr Cameron wants microphones in every person's residence.
People who feel with absolute certainty that someone else is always the problem will always try to grab more power for themselves, and because of that, they can't be trusted with the ability to grab power, even though their current goals in using that power are ostensibly laudatory. They can't be trusted with power, because they will never consider any part of any of their own goals as being suspect. Citizens don't benefit when people who can't cope with compromising and feeling frustrated have a career in politics or public service.

Comment: Re:Secret Ballot? (Score 2) 480

by John.Banister (#48796653) Attached to: How Bitcoin Could Be Key To Online Voting
I don't disagree, but I would like to point out that this "thug" has to work retail, interact with each voter, whereas your standard issue "corrupt election worker" can swap a box of voter secret ballots for a box of "election corrupter" secret ballots and change results in a more wholesale manner. One "thug" interaction per voter ought to make election corruption a little more expensive.

What if you made it so that the voting happened online, but the verification could only happen in a "vote verification booth" that is similar to (and monitored similarly to) a secret ballot voting booth. The number of people who would actually want to verify would always be smaller that the number who vote, so that might provide the beneficial convenience for the voting along with the security to keep thugs from seeing the verification. You could talk about a person bringing a camera into the verification booth, but that could happen with a voting booth also.

The next person to mention spaghetti stacks to me is going to have his head knocked off. -- Bill Conrad