Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Every project will be behind schedule (Score 1) 180

by Opportunist (#49142149) Attached to: The Programmers Who Want To Get Rid of Software Estimates

By definition. When you look at our current corporate culture, you know it has to be. For a simple reason: Companies bidding for jobs. And more often than not, the cheapest offer gets the deal.

Who is the cheapest? Usually the one that cut the most corners and underestimated his cost (i.e. time) to deliver the most.

Comment: Erh... Bruce, I usually like your insightful posts (Score 1) 93

by Opportunist (#49141769) Attached to: Schneier: Everyone Wants You To Have Security, But Not From Them

But this one is one of the "gee, really, you don't say?" kind.

OF COURSE everyone wants to be the only one who has access to something. Monopolies are something really awesome, and only cool if they are, well, monopolies.

Data is worthless if everyone has it, only if you have the exclusive ability to use it it becomes valuable. In our world, the value of something is determined by its scarcity. Data is now something that can, by its very nature, be reproduced with near zero cost in infinite amounts. It only becomes a commodity if you control when, how and most of all if that data may be reproduced.

Comment: Re:Terrorists (Score 4, Interesting) 256

by Opportunist (#49132757) Attached to: It's Official: NSA Spying Is Hurting the US Tech Economy

Well, at least...

It's funny to watch the whole spiel from across the pond. I know, maybe it's the distance and the loss of resolution distance entails, but I can't really see that much of a difference between those two parties that you have. It's pretty much the same party to me, maybe with a strawberry flavor here and a blueberry flavor there, but slushy is slushy. The basic ingredients are the same crap, the rest is flavoring. Artificial flavoring.

But yet you see people bicker with an insane drive to ensure that THEIR side of The Party isn't to blame, it's ALL the other side's fault. I look at the whole mess and can only think that you're sitting in a swimming pool with a line splitting it off in the middle, with either side blaming the other one for pissing in the pool but neither even thinking about getting out and draining the water.

Comment: Re:good bye to US datacenters (Score 1) 399

by Opportunist (#49129159) Attached to: NSA Director Wants Legal Right To Snoop On Encrypted Data

The problem is far easier to analyze. Let's take a look at the premises:

1. The enemy is able and willing to use torture and is able and willing to employ it to reach its goal.
2. You are a human being, able to feel pain, with a finite amount of willpower to resist torture, and unable to escape in a way that is favorable for you.

That's it. And no matter what else happens, it ends in a "don't care" position.

Whether you have that key does not matter. Because handing that key over does not end the torture, because if, in what way and for how long torture is applied is not within your control in any way. Yes, of course your torturer will promise you that it ends if you hand over what he wants, but do I really want to trust the word (because that is ALL I have, it's not like there's an enforceable contract between him and me) of someone willing to inflict pain upon me?

The torture ends only if your tormentor decides he wants to. This has little, if anything, to do with you handing over anything he wants.

Optimization hinders evolution.

Working...