Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment: Re: Sounds like a planned PR stunt to me. (Score 1) 622

by Nikker (#48137591) Attached to: The Correct Response To Photo Hack Victim-Blamers
I think the interesting thing is if there are ever any laws passed that deal with personal data cloud providers would go out of business out of fear of being hacked. We've sold ourselves so cheap if "personal data" ever becomes a thing, most of the internet would collapse. Well maybe not Wikipedia. But the rest of it for sure.

Comment: Re:They may still hire you (Score 2) 580

by Nikker (#48117491) Attached to: FBI Says It Will Hire No One Who Lies About Illegal Downloading
Exactly. It's a little convenient that the FBI is spilling the beans when they are about to interview a bunch of interns. They just want to spread the word and turn up the heat on these guys before the big day. I bet a choice few will be sweating buckets behind the desk when the day comes. The chances of them being able to staff more than a hand full of people that have never downloaded a MP3 in the Napster / Bittorrent era is just not going to happen. It's also an advantage of staffing people that know the culture.

But I digress.... Good luck guys!

Comment: Re:Still not actually open (Score 1) 56

by Nikker (#48096265) Attached to: AMD Building New GPU Linux Kernel Driver To Unify With Catalyst Driver
Something as an obfuscated driver will definitely not stop a major competitor unmasking processing units in a lab. That is what they do to their own hardware to troubleshoot, throwing the latest Nvidia or PoverVR across the same desk would be trivial. The blob will likely never go away. What ever the hardware is really capable of we may never know but any group can set up a kick starter to do the same unmasking, for the right price.

Comment: Re:How much is that doggy in the window? (song lin (Score 1) 153

by Nikker (#48025327) Attached to: LTE Upgrade Will Let Phones Connect To Nearby Devices Without Towers
How do you propose it gets around blackouts? If it did you would have the entire epicenter relying on fringe cell phones for service. It's like having an entire town piggy backing on a handful connections. Those who are in range will have their batteries toasted before you could say YouTube.

Comment: Re:What's so hard about using the time-honored (Score 2) 242

by Nikker (#48018175) Attached to: At CIA Starbucks, Even the Baristas Are Covert
This is just a fluff piece. Lying would be so ingrained into an agent of this type that their own mothers probably don't know their names anymore. If someone asks you your name for something like this you just make up a name, that is their job. If anyone asks just say your name is Lorem Ipsum.

+ - FCC to rule on "Paid Prioritization" deals by Internet service providers

Submitted by Anonymous Coward
An anonymous reader writes "After a record 3.7 million public comments on net neutrality, the FCC is deciding if the company that supplies your internet access should be allowed to make deals with online services to move their content faster. The FCC’s chairman Tom Wheeler says financial arrangements between providers and content sites might be OK if the agreement is “commercially reasonable” and companies say publicly how they prioritize traffic. Many disagree, saying this sets up an internet for the highest bidder. “If Comcast and Time Warner – who already have a virtual monopoly on Internet service – have the ability to manage and manipulate Internet speeds and access to benefit their own bottom line, they will be able to filter content and alter the user experience,” said Barbara Ann Luttrell, 26, of Atlanta, in a recent submission to the FCC."

Comment: Re:Yes, there is a cost (Score 1) 354

by Nikker (#47999243) Attached to: FBI Chief: Apple, Google Phone Encryption Perilous
Don't forget, if they are looking to obtain the contents of a single device that means they already have enough on that particular person to look into what you are doing. It's not like they found a person actively engaging in a crime and say "well we can't access his email or his smartphone we mine as well give up".

Comment: Re: And they wonder why I block ads... (Score 1) 226

by Nikker (#47951859) Attached to: Google's Doubleclick Ad Servers Exposed Millions of Computers To Malware
The point I was trying to make is since with web content both the content and advertising are on the same page at the same time they both have the same primary goal, catch your attention. The ads can distract the reader from the content making your content less effective. It's a trade off. But a co the creator should be wary of the ways the advertisers are interacting with their users.

Comment: Re: And they wonder why I block ads... (Score 1) 226

by Nikker (#47951391) Attached to: Google's Doubleclick Ad Servers Exposed Millions of Computers To Malware
It's not just the visual representation that the ad companies are after. It is their job to distract you from the info/content you are reading. So while the site might make a couple more dollars with ads they lose interest in their content or their messages are not being absorbed they way the content creator had intended.

On top of all of this many scripts on the page from ad companies are not only tracking the ad but sitting on every event loop. Now when you scroll change focus or many other actions your browser will have to deal with that as well again distracting from the content.

In the end the content creator is losing their power of conveying their message in relation to distraction ad revenue.

The use of anthropomorphic terminology when dealing with computing systems is a symptom of professional immaturity. -- Edsger Dijkstra

Working...